نتایج جستجو برای: Flooding Attacks

تعداد نتایج: 70542  

2015
Md. Ariful Hoque Barnali Chakraborty

This paper discusses a statistical algorithm to detect DOS attacks on computer networks. DOS attacks hamper the network by making resources unavailable to genuine users. The algorithm presented here use SNMP data in order to detect incoming flooding attack on a computer or network. The data to be monitored depends on the class of flooding attacks that is intended to be detected. In this paper w...

2012
XUEHUA YANG

Through deeply analyzing on the principle, mode, character of SIP DoS and the flooding attacks faced by SIP network, the prevention model to combine a dynamic threshold adjustment with real-time dynamic prevention for SIP flooding attacks was proposed. This model included logically chi-square traffic judgement model, cumulative statistics model and IP prevention model, among which chi-square tr...

2002
Haining Wang Danlu Zhang Kang G. Shin

We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity of our detection mechanism lies in its statelessness and low computation overhead, which make the detec...

2002
Ryo Kaizaki Kenjiro Cho Osamu Nakamura

Denial of Service attacks is divided into two types, one is logic attack and the another one is flooding attack. Logic attack exploits security holl of the software such as operating system and web server bugs, then causes system crash or degrade in the performance. Logic attack can be defended by upgrading software and/or filtering particular packet sequences. Comparing each packets of the flo...

2017
Jean Tajer Mo Adda Benjamin Aziz

This paper deals with detection of flooding attacks which are the most common type of Denial of Service (DoS) attacks in a Mobile Agent World. We propose a new framework for the detection of flooding attacks by integrating Divergence measures over Sketch data structure. The performance of the proposed framework is investigated in terms of detection probability and false alarm ratio. We focus on...

2014
Sunanda Puri Harish Saini

Mobile Ad Hoc Networks (MANETs) is a collection of wireless mobile nodes connected by wireless links forming a temporary network without the aid of any infrastructure or any centralized administration. Owing to its mobility and broadcast nature MANETs are particularly vulnerable to attacks over traditional wired networks finally makes them susceptible to various active and passive attacks. In p...

2017
Jean Tajer Mo Adda Benjamin Aziz

This paper deals with detection of flooding attacks which are the most common type of Denial of Service (DoS) attacks in a Mobile Agent World. We propose a new framework for the detection of flooding attacks by integrating Divergence measures over Sketch data structure. The performance of the proposed framework is investigated in terms of detection probability and false alarm ratio. We focus on...

2012
P. P. S. Naik

There is a wide usage of mobiles anywhere and anytime to access the multimedia data. Thus there will be more oppurtunity for wireless adhoc networks. Because, comparing with the wired networks, wireless networks provides low cost and easy accesibility. But the main disadvantage for Consumer electronic devices were generally operate on limited battery power and therfore are vulnerable to securit...

2012
Yu Ming

Flooding-based DDoS attacks is a very common way to attack a victim machine by directly or indirectly sending a large amount of malicious traffic to it. Stochastic Fairness Queueing (SFQ) is a typical implementation of Fair Queueing. This paper focuses on exploring the feasibility of mitigating flooding-based DDoS attacks by queueing disciplines. A comparative study is made between SFQ and FCFS...

Journal: :Computers & Security 2010
Sven Ehlert Dimitris Geneiatakis Thomas Magedanz

Session Initiation Protocol is a core protocol for coming real time communication networks, including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly susceptible to Denial-of-Service Attacks launched against SIP servers. More than 20 different research works have been published to address SIP-related DoS problems. In this survey we explain three different types of DoS a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید