• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,230
Next 10 →

Denial-of-Service Attacks

by Karageorgiou Theofilos, Agapidou Eleni, Masheva Viktoryia, Nanakou Theoni
"... Denial of Service, or DoS, defines the attack to a computer or a network as to deprive users from services. Whether being the attack per se or a component of an attack denial of service basic attack types fall into three categories which are (i) exploitation of computational resources, (ii) alterati ..."
Abstract - Add to MetaCart
Denial of Service, or DoS, defines the attack to a computer or a network as to deprive users from services. Whether being the attack per se or a component of an attack denial of service basic attack types fall into three categories which are (i) exploitation of computational resources, (ii

Denial-of-Service attacks �

by Sherif Khattab A, Rami Melhem A, Daniel Mossé A, Taieb Znati A , 2006
"... Honeypot back-propagation for mitigating spoofing distributed ..."
Abstract - Add to MetaCart
Honeypot back-propagation for mitigating spoofing distributed

DENIAL-OF-SERVICE ATTACK ON PROGRAMMABLE ROUTER 1

by Ying Hu, Lei Zhuang
"... Because of the limitation of routers which use ASICs, there are more and more programmable routers be adopted at present, it is a trend that the ASIC routers will be replaced. Programmable router brings out flexibility, at the same time, it brings out security problems. This paper introduced a type ..."
Abstract - Add to MetaCart
of network attack. The attack sends appropriate length of packet, while application code could not detect that the length of the packet is out of range, and the operation of inserting header leads to buffer overflow, thereby, this forms denial-of-service attack.

Detecting Distributed Denial-of-Service Attacks by

by unknown authors
"... SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. To assure that network services will not be int ..."
Abstract - Add to MetaCart
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. More are SYN Flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. To assure that network services

Authenticated Multicast Immune to Denial-of-ServiceAttack

by unknown authors
"... ABSTRACT Authentication of multicast streams has attracted a lot of attention in the last few years. However, two important issues, namely multicast denial-of-service and access control, have been ignored in previous proposals. In this paper, we propose two Internet Protocol multicast authentication ..."
Abstract - Add to MetaCart
authentication schemes by making use of the multicast tree as an essential authentication mechanism. Our schemes are efficient and immune to multicast denial-of-service attack. They allow the receivers to immediately authenticate the packets regardless of the packet loss characteristics of the underlying network

Denial-of-service attacks on host-based generic unpackers

by Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia - BERLIN HEIDELBERG , 2009
"... With the advance of packing techniques, a few generic and automatic unpackers have been proposed. These unpackers are designed to automatically unpack packed binaries without specific knowledge of the packing techniques used. In this paper, we present an automatic packer with which packed malware ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
forges spurious unpacking behaviors that lead to a denial-of-service attack on host-based generic unpackers. We present the design, implementation, and evaluation of the proposed packer and malware produced using the proposed packer, and show the success of denial-of-service attacks on host-based generic

Keeping Denial-of-Service Attackers in the Dark

by Gal Badishi, Amir Herzberg, Idit Keidar , 2005
"... We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that have knowledge of their attack's successfulness, e.g., by observing service performance degradation, or by eavesdropping on messages or parts thereof. A solution for this problem ..."
Abstract - Cited by 10 (3 self) - Add to MetaCart
We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that have knowledge of their attack's successfulness, e.g., by observing service performance degradation, or by eavesdropping on messages or parts thereof. A solution for this problem

Chapter 8 Denial-of-Service Attacks

by Aikaterini Mitrokotsa, Christos Douligeris
"... Availability requires that computer systems function normally without loss of resources to legitimate users. One of the most challenging issues to availability is the denial-of-service (DoS) attack. DoS attacks constitute one of the major threats and among the hardest security problems in today’s In ..."
Abstract - Add to MetaCart
Availability requires that computer systems function normally without loss of resources to legitimate users. One of the most challenging issues to availability is the denial-of-service (DoS) attack. DoS attacks constitute one of the major threats and among the hardest security problems in today’s

Spotlight Denial-of-Service Attack- Detection Techniques

by Glenn Carl, George Kesidis
"... Denial-of-service (DoS) detection techniques — such as activity profiling,changepoint detection,and wavelet-based signal analysis — face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey of techniques ..."
Abstract - Add to MetaCart
Denial-of-service (DoS) detection techniques — such as activity profiling,changepoint detection,and wavelet-based signal analysis — face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey

Authentication Under Denial-of-Service Attacks

by Bettina Weiss, Technische Universität Wien - in Communications and Computer Networks , 2002
"... DFEG3H"IKJMLMNOIPERQ SPTULWVXEZY\[^]K_a`[cb>[^dKd e3fMgihkj>lmlMj n oqpsr tvuwpsxy{z|psx~}u u t tvu xz … P}m!Łt xyt n p5pzy/ ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
DFEG3H"IKJMLMNOIPERQ SPTULWVXEZY\[^]K_a`[cb>[^dKd e3fMgihkj>lmlMj n oqpsr tvuwpsxy{z|psx~}u u t tvu xz … P}m!Łt xyt n p5pzy/
Next 10 →
Results 1 - 10 of 3,230
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University