Printer Friendly

Browse Denial of service attacks topic

Control subtopic

Articles

1-38 out of 38 article(s)
Title Author Type Date Words
Updated SSDP Scheme for DDoS Attack Defense. Huang, Haiou; Hu, Liang; Chu, Jianfeng Technical report Sep 1, 2018 5605
System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. Choi, Seul-Ki; Yang, Chung-Huang; Kwak, Jin Report Feb 1, 2018 3649
Hanqing Wu. Sun, Yiting Brief article Sep 1, 2017 152
Vulnerable path attack and its detection. Tong, Ying; Shen, Yuehong; Gao, Bin; Sun, Fenggang; Chen, Rui; Xu, Yefeng Report Apr 1, 2017 8080
Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks. Dener, Murat; Bay, Omer Faruk Report Jan 1, 2017 4885
Low-Rate DDoS Attack Detection Using Expectation of Packet Size. Zhou, Lu; Liao, Mingchao; Yuan, Cao; Zhang, Haoyu Report Jan 1, 2017 9489
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks. Riaz, Rabia; Chung, Tae-Sun; Rizvi, Sanam Shahla; Yaqub, Nazish Report Jan 1, 2017 6729
HTTP flood mitigation using gateway inspection and second chance approach. Idris, Ismaila; Tobi, Ogidiagba Jones; Waziri, Victor O.; Alhassan, John K.; Joseph, Ojeniyi Report Jan 1, 2017 4749
An OpenFlow user-switch remapping approach for DDoS defense. Wei, Qiang; Wu, Zehui; Ren, Kalei; Wang, Qingxian Report Sep 1, 2016 5951
Cloud attack detection with intelligent rules. Pradeepthi, K.V.; Kannan, A. Report Oct 1, 2015 6619
Cyber security still an inflated problem. Brief article Jan 18, 2015 207
A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment. Iyengar, N. Ch. S.N.; Banerjee, Arindam; Ganapathy, Gopinath Report Dec 1, 2014 10026
An empirical study on dos attacks and DDoS defense mechanism. Mary, S. Angel Latha; Sabaridha, E.; Sivagami, A.N.; Rani, M. Usha Report Oct 1, 2014 6355
Defending HTTP web servers against DDoS attacks through busy period-based attack flow detection. Nam, Seung Yeob; Djuraev, Sirojiddin Report Jul 1, 2014 9183
An approach for DDoS attack prevention in mobile ad hoc networks. Timcenko, V.V. Report Jun 1, 2014 3147
How to survive a cyberattack: here's how a North Carolina district responded to a denial-of-service attack that came from one of its own schools. Hardin, Phil May 1, 2014 1311
A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets. Kavisankar, L.; Chellappan, C.; Sivasankar, P.; Ashwin, Karthi; Srinivas, A. Report May 1, 2014 7244
Development of indicators for information security level assessment of VoIP service providers. Yoon, Seokung; Park, Haeryong; Yoo, Hyeong Seon Report Feb 1, 2014 4096
The framework for simulation of bioinspired security mechanisms against network infrastructure attacks. Shorov, Andrey; Kotenko, Igor Report Jan 1, 2014 6640
Hybrid single-packet IP traceback with low storage and high accuracy. Yang, Ming Hour Report Jan 1, 2014 8825
Clustering-based pattern abnormality detection in distributed sensor networks. Jang, Seok-Woo; Kim, Gye-Young; Byun, Siwoo Report Jan 1, 2014 5031
A novel method defends against the path-based DoS for wireless sensor network. Chen, Dong; Zhang, Zhenjiang; Tseng, Fan-Hsun; Chao, Han-Chieh; Chou, Li-Der Report Jan 1, 2014 5581
Design of an Adaptive Distributed Critical-Care Extensive Response Network (AD-CERN) using cooperative overlay network. Akilandeswari, V.; Shalinie, S. Mercy Report Jan 1, 2014 8460
An enhanced entropy approach to detect and prevent DDoS in cloud environment. Jeyanthi, N.; Iyengar, N. Ch. S.N.; Kumar, P.C. Mogan; Kannammal, A. Report Aug 1, 2013 6054
Impact evaluation of DDoS attacks on DNS cache server using queuing model. Wang, Zheng; Tseng, Shian-Shyong Report Apr 1, 2013 6371
What if your business is hacked. Gao, Kevin Mar 1, 2013 954
Real-time detection of application-layer DDoS attack using time series analysis. Ni, Tongguang; Gu, Xiaoqing; Wang, Hongyuan; Li, Yu Report Jan 1, 2013 4231
Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment. Jeyanthi, N.; Iyengar, N.Ch.S.N. Report Dec 1, 2012 7352
Analysis of flooding DoS attacks utilizing DNS name error queries. Wang, Zheng Oct 1, 2012 5483
POSSIBLE INTRUSIONS AND THEIR DETECTION BASED ON THE PROPOSED MODEL FOR C4I SYSTEMS. Alelaiwi, Abdulhameed; Nasir, Muhammad Report Sep 30, 2012 2737
Detecting LDoS attacks based on attacks based on abnormal network traffic. Chen, Kai; Liu, HuiYu; Chen, XiaoSu Report Jul 1, 2012 8811
Attacks on and countermeasures for an RFID mutual authentication scheme in pervasive computing environment. Mohaisen, Abedelaziz; Chang, Ku-Young; Hong, Dowon Report Sep 1, 2011 7157
Enhancing DDoS flood attack detection via intelligent fuzzy logic. Xia, Zhengmin; Lu, Songnian; Li, Jianhua; Tang, Junhua Report Dec 1, 2010 6741
Combining adaptive filtering and IF flows to detect DDoS attacks within a router. Yan, Ruoyu; Zheng, Qinghua; Li, Haifei Report Jun 1, 2010 10503
Is Twitter safe after being 'politically' attacked? Brief article Aug 7, 2009 194
Tata Communications deploys Arbor Networks' Peakflow SP and TMS. Brief article May 7, 2008 243
Prolexic adds new capabilities to protect from peer-to-peer DDoS attacks. Brief article May 24, 2007 172
E-mail bombs: growing numbers of "denial-of-service attacks" are directed at schools. Dyrli, Odvard Egil May 1, 2006 575

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters