Results 1 - 10
of
3,230
Denial-of-Service Attacks
"... Denial of Service, or DoS, defines the attack to a computer or a network as to deprive users from services. Whether being the attack per se or a component of an attack denial of service basic attack types fall into three categories which are (i) exploitation of computational resources, (ii) alterati ..."
Abstract
- Add to MetaCart
Denial of Service, or DoS, defines the attack to a computer or a network as to deprive users from services. Whether being the attack per se or a component of an attack denial of service basic attack types fall into three categories which are (i) exploitation of computational resources, (ii
Denial-of-Service attacks �
, 2006
"... Honeypot back-propagation for mitigating spoofing distributed ..."
DENIAL-OF-SERVICE ATTACK ON PROGRAMMABLE ROUTER 1
"... Because of the limitation of routers which use ASICs, there are more and more programmable routers be adopted at present, it is a trend that the ASIC routers will be replaced. Programmable router brings out flexibility, at the same time, it brings out security problems. This paper introduced a type ..."
Abstract
- Add to MetaCart
of network attack. The attack sends appropriate length of packet, while application code could not detect that the length of the packet is out of range, and the operation of inserting header leads to buffer overflow, thereby, this forms denial-of-service attack.
Detecting Distributed Denial-of-Service Attacks by
"... SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. To assure that network services will not be int ..."
Abstract
- Add to MetaCart
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. To assure that network services
Authenticated Multicast Immune to Denial-of-ServiceAttack
"... ABSTRACT Authentication of multicast streams has attracted a lot of attention in the last few years. However, two important issues, namely multicast denial-of-service and access control, have been ignored in previous proposals. In this paper, we propose two Internet Protocol multicast authentication ..."
Abstract
- Add to MetaCart
authentication schemes by making use of the multicast tree as an essential authentication mechanism. Our schemes are efficient and immune to multicast denial-of-service attack. They allow the receivers to immediately authenticate the packets regardless of the packet loss characteristics of the underlying network
Denial-of-service attacks on host-based generic unpackers
- BERLIN HEIDELBERG
, 2009
"... With the advance of packing techniques, a few generic and automatic unpackers have been proposed. These unpackers are designed to automatically unpack packed binaries without specific knowledge of the packing techniques used. In this paper, we present an automatic packer with which packed malware ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
forges spurious unpacking behaviors that lead to a denial-of-service attack on host-based generic unpackers. We present the design, implementation, and evaluation of the proposed packer and malware produced using the proposed packer, and show the success of denial-of-service attacks on host-based generic
Keeping Denial-of-Service Attackers in the Dark
, 2005
"... We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that have knowledge of their attack's successfulness, e.g., by observing service performance degradation, or by eavesdropping on messages or parts thereof. A solution for this problem ..."
Abstract
-
Cited by 10 (3 self)
- Add to MetaCart
We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that have knowledge of their attack's successfulness, e.g., by observing service performance degradation, or by eavesdropping on messages or parts thereof. A solution for this problem
Chapter 8 Denial-of-Service Attacks
"... Availability requires that computer systems function normally without loss of resources to legitimate users. One of the most challenging issues to availability is the denial-of-service (DoS) attack. DoS attacks constitute one of the major threats and among the hardest security problems in today’s In ..."
Abstract
- Add to MetaCart
Availability requires that computer systems function normally without loss of resources to legitimate users. One of the most challenging issues to availability is the denial-of-service (DoS) attack. DoS attacks constitute one of the major threats and among the hardest security problems in today’s
Spotlight Denial-of-Service Attack- Detection Techniques
"... Denial-of-service (DoS) detection techniques — such as activity profiling,changepoint detection,and wavelet-based signal analysis — face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey of techniques ..."
Abstract
- Add to MetaCart
Denial-of-service (DoS) detection techniques — such as activity profiling,changepoint detection,and wavelet-based signal analysis — face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey
Authentication Under Denial-of-Service Attacks
- in Communications and Computer Networks
, 2002
"... DFEG3H"IKJMLMNOIPERQ SPTULWVXEZY\[^]K_a`[cb>[^dKd e3fMgihkj>lmlMj n oqpsr tvuwpsxy{z|psx~}u u t tvu xz
P}m!Łt xyt n p5pzy/ ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
DFEG3H"IKJMLMNOIPERQ SPTULWVXEZY\[^]K_a`[cb>[^dKd e3fMgihkj>lmlMj n oqpsr tvuwpsxy{z|psx~}u u t tvu xz
P}m!Łt xyt n p5pzy/
Results 1 - 10
of
3,230