نتایج جستجو برای: distributed denial of service attack

تعداد نتایج: 21214602  

Journal: :JNW 2009
Yogesh Chaba Yudhvir Singh Preeti Aneja

In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad hoc On Demand Vector (AODV) routing protocol as the base protocol it is possible to find a suitable solution to overcome the malicious flooding i.e. attack of initiating / forwarding Route Requests (RREQs) that lead to ...

2013
Stan Zdonik Peng Ning Shashi Shekhar Jonathan Katz Xindong Wu Lakhmi C. Jain David Padua Xuemin Shen Borko Furht V. S. Subrahmanian Martial Hebert Katsushi Ikeuchi Bruno Siciliano Shui Yu

In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible research methods and strategies to serve th...

2013
B. Aravind

— A DDoS (i.e., Distributed Denial of Service) attack is a large scale distributed attempt by malicious attackers to fill the users’ network with a massive number of packets. This exhausts resources like bandwidth, computing power, etc.; User can’t provide services to its clients and network performance get destroyed. The methods like hop count filtering; rate limiting and statistical filtering...

Journal: :Complexity 2021

Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used defend against DDoS attacks have been proposed recently. To study the impact of defense strategy selection on behavior, current uses logistic function as basis propose dynamic model with defending decisions. Thereafter, attacked threshold this calculated. The existence and stability attack-fre...

Journal: :International Journal on Advanced Science, Engineering and Information Technology 2018

2007
JONATHAN D. MOFFETT

This article is an introduction to the subject of security in distributed systems. It is assumed that the reader is generally familiar with the concepts of computer and communications security, by which we mean protection against risks which can compromise data integrity, allow unauthorised disclosure of information or lead to denial of service in systems. However, this article aims to be clear...

2009
Raimundo José de Araújo Macêdo Allan Edgard Silva Freitas

Group Communication is a powerful abstraction that is being widely used to manage consistency problems in a variety of distributed system models, ranging from synchronous, to time-free asynchronous model. Though similar in principles, distinct implementation mechanisms have been employed in the design of group communication for distinct system models. However, the hybrid nature of many modern d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید