نتایج جستجو برای: normal request

تعداد نتایج: 602536  

2004
Angelos Stavrou Angelos D. Keromytis Dan Rubenstein

Peer to Peer (P2P) systems that utilize Distributed Hash Tables (DHTs) provide a scalable means to distribute the handling of lookups. However, this scalability comes at the expense of increased vulnerability to specific types of attacks. In this paper, we focus on insider denial of service (DoS) attacks on such systems. In these attacks, nodes that are part of the DHT system are compromised an...

2011
Selvamani Kadirvelu

Problem statement: It is necessary to propose suitable detection and prevention mechanisms to provide security for the information contents used by the web application. Many prevention mechanisms which are currently available are not able to classify anomalous, random and normal request. This leads to the problem of false positives which is classifying a normal request as anomalous and denying ...

2012
R. Sukanesh

Hackers uses Distributed Denial of Service (DDoS) and leaves hundreds and thousands of bots to overwhelm the victim in terms of bandwidth and reduce the services that are rendering to the users. To initiate an attack against victim, hackers use the internet as their venue. To address this threat various methods were proposed, but all the earlier method identifies the DDoS attack that exists in ...

Journal: :Computers & Security 2022

There are many datasets for training and evaluating models to detect web attacks, labeling each request as normal or attack. Web attack protection tools must provide additional information on the type of detected, in a clear simple way. This paper presents new multi-label dataset classifying attacks based CAPEC classification, way features extraction ASCII values, evaluation several combination...

Journal: :Psychiatry and Clinical Neurosciences 2002

Journal: :Psychiatric Bulletin 1989

Journal: :International Journal of Trauma Nursing 2001

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید