نتایج جستجو برای: denial of service

تعداد نتایج: 21193855  

2006
Dan Austin

Denial of service attacks can be catastrophic in wireless sensor networks. Typical denial of service attacks consist of either communications jamming or resource depletion through forcing continuous stimuli and communication between motes on the network. Localization is another interesting challenge in the world of sensor networks. Many applications utilizing sensor networks require that the an...

2017

Distributed denial-of-service (DDoS) could be a rapidly growing drawback. The multitude and sort of each the attacks and the defense approaches is overwhelming. This paper is a survey on the drawback of denial-of-service (DoS) and Distributed Denial of Service (DDoS) attacks and projected ways in which to deal with it. we tend to describe the character of the matter and look for its root causes...

2016
R. Suganya

Denial-of-Service attack is an attempt to make a system, machine or network resources unavailable to its user by blocking or denying the services. The Denial-of-Service attack is identified with the help of detection algorithm. The anomaly detection mechanism not provides the better results so the user need to implement the hybrid detection algorithm which is the combination of anomaly detectio...

2008
Giovanni Branca

Recently, many hackers attacks are done with a distributed denial of service (DDoS) strategy. Most famous centralized peer to peer (P2P) networks can be easily used for realize these attacks. File-sharing protocols such BitTorrent or an extension of Gnutella use centralized server for orchestrate 7-level connections between peers. This procedure create a point-of-failure because malicious centr...

2016
WAEL ALOSAIMI

Network availability is threatened by the traditional Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. The risk is much increased with the emergence of the new computing paradigm of cloud computing. In this era, DDoS attacks can threaten the cloud sustainability by hitting its pricing model exploiting the cloud scalability feature. Therefore, a new phenomenon is emerged...

1995
Myong H. Kang Ira S. Moskowitz Daniel C. Lee

A designer of reliable MLS networks must consider covert channels and denial of service attacks in addition to traditional network performance measures such as throughput, fairness, and reliability. In this paper we show how to extend the NRL data Pump to a certain MLS network architecture in order to balance the requirements of congestion control, fairness, good performance , and reliability a...

2011
Eric Koziel David Robinson

The use of botnets for malicious activities has grown significantly in recent years. Criminals leverage the flexibility and anonymity associated with botnets to harvest personal data, generate spam, distribute malware and launch distributed denial-of-service attacks. These same attributes readily translate to applications that can support operations in warfare. In 2007, distributed denial-of-se...

2004
Tao Peng Christopher Leckie Kotagiri Ramamohanarao

In this paper, we propose a simple but robust scheme to detect denial of service attacks (including distributed denial of service attacks) by monitoring the increase of new IP addresses. Unlike previous proposals for bandwidth attack detection schemes which are based on monitoring the traffic volume, our scheme is very effective for highly distributed denial of service attacks. Our scheme explo...

Journal: :پژوهشنامه ثقلین 0
محمدرضا شایق استادیار گروه فقه و مبانی حقوق دانشگاه یزد

one of the most important topics in the field of jurisprudence and interpretation of the noble quran is freedom of religion which is also drawn into the political sphere. discussions on the seeming conflict between verses of sword and denial of duress have aroused controversies among researchers. one of the four following possible relationships can be established between verses of sword and den...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید