نتایج جستجو برای: ddos attack

تعداد نتایج: 81369  

2013
Sarah Ahmed S. M. Nirkhi

Mobile Ad Hoc Network (MANET) is a mobile distributed wireless networks. In MANET each node are self capable that support routing functionality in an ad hoc scenario, forwarding of data or exchange of topology information using wireless communications. These characteristic specifies a better scalability of network. But this advantage leads to the scope of security compromising. One of the easy ...

2011
Sunil Kumar Mandeep Singh Monika Sachdeva Krishan Kumar Bhai Maha Singh

In present era, the world is highly dependent on the Internet and it is considered as main infrastructure of the global information society. Therefore, the Availability of information and services is very critical for the socio-economic growth of the society. However, the inherent vulnerabilities of the Internet architecture provide opportunities for a lot of attacks on its infrastructure and s...

2013

Executive Summary Distributed Denial of Service (DDoS) attacks are a major cause of disruption for networks and the distributed applications they host. With enhancements of routers and intermediate network devices and appliances, the level of attention given to DDoS attacks has reduced over time, as they have been viewed as less of a security issue. These traditional volumetric attacks were oft...

Journal: :The Journal of Digital Policy and Management 2014

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2016

Journal: :Network Security 2011
Steve Mansfield-Devine

According to a report from Prolexic, one of the first and largest companies offering DDoS mitigation services, ⁠ attack traffic rose 66% over the course of a year (to Q3 2011). 1 Network-layer attacks accounted for 83%, the rest being application-layer attacks. The average duration was 1.4 days and the average bandwidth consumed was 1.5Gbps. The size of attacks is getting bigger, too. In July 2...

Journal: :Complexity 2021

Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used defend against DDoS attacks have been proposed recently. To study the impact of defense strategy selection on behavior, current uses logistic function as basis propose dynamic model with defending decisions. Thereafter, attacked threshold this calculated. The existence and stability attack-fre...

Journal: :I. J. Network Security 2009
Moon-Chuen Lee Yijun He Zhaole Chen

Distributed Denial of Service (DDoS ) attacks could be considered as one of the most serious security problems to the Internet today. To locate the sources of the attack packets, we usually need to find the paths through which the attack packets traversed from the sources to the victim. In this paper, we identify the weaknesses of an existing algebraic marking scheme for tracing DDoS attacks, a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید