نتایج جستجو برای: denial of service
تعداد نتایج: 21193855 فیلتر نتایج به سال:
Denial of service attacks can be catastrophic in wireless sensor networks. Typical denial of service attacks consist of either communications jamming or resource depletion through forcing continuous stimuli and communication between motes on the network. Localization is another interesting challenge in the world of sensor networks. Many applications utilizing sensor networks require that the an...
Distributed denial-of-service (DDoS) could be a rapidly growing drawback. The multitude and sort of each the attacks and the defense approaches is overwhelming. This paper is a survey on the drawback of denial-of-service (DoS) and Distributed Denial of Service (DDoS) attacks and projected ways in which to deal with it. we tend to describe the character of the matter and look for its root causes...
Denial-of-Service attack is an attempt to make a system, machine or network resources unavailable to its user by blocking or denying the services. The Denial-of-Service attack is identified with the help of detection algorithm. The anomaly detection mechanism not provides the better results so the user need to implement the hybrid detection algorithm which is the combination of anomaly detectio...
Recently, many hackers attacks are done with a distributed denial of service (DDoS) strategy. Most famous centralized peer to peer (P2P) networks can be easily used for realize these attacks. File-sharing protocols such BitTorrent or an extension of Gnutella use centralized server for orchestrate 7-level connections between peers. This procedure create a point-of-failure because malicious centr...
Network availability is threatened by the traditional Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. The risk is much increased with the emergence of the new computing paradigm of cloud computing. In this era, DDoS attacks can threaten the cloud sustainability by hitting its pricing model exploiting the cloud scalability feature. Therefore, a new phenomenon is emerged...
A designer of reliable MLS networks must consider covert channels and denial of service attacks in addition to traditional network performance measures such as throughput, fairness, and reliability. In this paper we show how to extend the NRL data Pump to a certain MLS network architecture in order to balance the requirements of congestion control, fairness, good performance , and reliability a...
The use of botnets for malicious activities has grown significantly in recent years. Criminals leverage the flexibility and anonymity associated with botnets to harvest personal data, generate spam, distribute malware and launch distributed denial-of-service attacks. These same attributes readily translate to applications that can support operations in warfare. In 2007, distributed denial-of-se...
In this paper, we propose a simple but robust scheme to detect denial of service attacks (including distributed denial of service attacks) by monitoring the increase of new IP addresses. Unlike previous proposals for bandwidth attack detection schemes which are based on monitoring the traffic volume, our scheme is very effective for highly distributed denial of service attacks. Our scheme explo...
one of the most important topics in the field of jurisprudence and interpretation of the noble quran is freedom of religion which is also drawn into the political sphere. discussions on the seeming conflict between verses of sword and denial of duress have aroused controversies among researchers. one of the four following possible relationships can be established between verses of sword and den...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید