نتایج جستجو برای: flooding attacks

تعداد نتایج: 70542  

2003
Virgil D. Gligor

We argue that open networks designed using end-to-end arguments are particularly vulnerable to flooding, and that this vulnerability persists as hardware and operating systems technologies advance. An effective end-to-end approach to counter distributed flooding attacks against public services and provide access guarantees to their clients is to establish and enforce “user agreements” among cli...

2011
Soo Bum Lee Virgil D. Gligor

— Malware-contaminated hosts organized as a " bot network " can target and flood network links (e.g., routers). Yet, none of the countermeasures to link flooding proposed to date have provided dependable link access (i.e., bandwidth guarantees) for legitimate traffic during such attacks. In this paper, we present a router subsystem called FLoc (Flow Localization) that confines attack effects an...

2012
Gholam Shaker Shahram Jamali

SYN-flooding attack uses the weakness available in TCP’s three-way handshake process to keep it from handling legitimate requests. This attack causes the victim host to populate its backlog queue with forged TCP connections. In other words it increases PSA (probability of success of attack) and decreases BUE (buffer utilization efficiency) in the victim host and results to decreased performance...

2005
Yanxiang He Wei Chen Bin Xiao

DistributedDenial-of-Service (DDoS) attacks seriously threat the servers in the Internet.Most of current research is focused on the detection and preventionmethods at the victim side or the source side. However, defense at the innocent side, whose IP is used as the spoofed IP by the attacker, is always ignored. In this paper, a novelmethod at the innocent side has been proposed. Our detection s...

Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...

Journal: :EURASIP J. Adv. Sig. Proc. 2007
Khushboo Shah Edmond A. Jonckheere Stephan Bohacek

Computer network traffic is analyzed via mutual information techniques, implemented using linear and nonlinear canonical correlation analyses, with the specific objective of detecting UDP flooding attacks. NS simulation of HTTP, FTP, and CBR traffic shows that flooding attacks are accompanied by a change of mutual information, either at the link being flooded or at another upstream or downstrea...

2013
Shui Yu Yonghong Tian Dapeng Oliver Wu

DDoS attacks aim to exhaust the resources of victims, such as network bandwidth, computing power and operating system data structures. Early DDoS attacks emerged around the year 2000, and well-known web sites, such as CNN, Amazon and Yahoo, have been the targets of hackers since then. The purpose of early attacks was mainly for fun and curiosity about the technique. However, recently we have wi...

2006
Olivier Paul

On the Internet, web servers are often the main interface between companies or individuals and the rest of the world. As a result they represent valuable targets for attackers. Although several types of attacks are possible against web server we focus in this paper on flooding based denial of service attacks. We explore the detection of saturation attacks against web servers as well as the prec...

2013
A. Francis Saviour Devaraj

------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------Mobile Adhoc Networks (MANET) are new paradigm of wireless networks providing unrestricted mobility to nodes with no fixed or centralized infrastructure. Each node participating in the network acts as router to route the data from source to destination. This...

2012
Alexandru G. Bardas Loai Zomlot Sathya Chandran Sundaramurthy Xinming Ou S. Raj Rajagopalan Marc R. Eisenbarth

UDP traffic has recently been used extensively in flooding-based distributed denial of service (DDoS) attacks, most notably by those launched by the Anonymous group. Despite extensive past research in the general area of DDoS detection/prevention, the industry still lacks effective tools to deal with DDoS attacks leveraging UDP traffic. This paper presents our investigation into the proportiona...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید