Skip to main content
In 2006, 100,000 servers were broken down just within 10 minutes . Those were the victims of some Denial-of-Service attacks. This news and knowing that some of those victims were so well-known companies like Hotmail and Amazon, indicate... more
    • by 
    •   7  
      DoS AttackCryptographyProtocolsInternet
The emergence of Voice over IP (VoIP) has offered numerous advantages for end users and providers alike, but simultaneously has introduced security threats, vulnerabilities and attacks not previously encountered in networks with a closed... more
    • by 
    •   10  
      Distributed ComputingVoice over IPComputer CommunicationsSession Initiation Protocol
Distributed Denial of Service (DDoS) attacks are a threat to the security of red. In recent years, these attacks have been directed especially towards the application layer. This phenomenon is mainly due to the large number of existing... more
    • by 
    •   3  
      Computer ScienceDenial of Service AttackWebology
A denial-of-service (DoS) attack is an attempt by a single person or a group of people to disrupt an online service. In a bandwidth attack, attackers clog links or routers by generating a traffic overload. This can have serious... more
    • by 
    •   4  
      DoS AttackData StructureDenial of ServiceDenial of Service Attack
We describe possible denial of service attacks to access points in infrastructure wireless networks using the 802.11b protocol. To carry out such attacks, only commodity hardware and software components are required. The experimental... more
    • by  and +1
    •   10  
      Distributed ComputingAutomataDoS AttackWireless networks
Despite a plethora of research in the area, none of the mechanisms proposed so far for Denial-of-Service (DoS) mitigation has been widely deployed. We argue in this paper that these deployment difficulties are primarily due to economic... more
    • by 
    •   11  
      BusinessNetwork SecuritySocial WelfareVirtual Private Network
Distributed Denial of Service (DDoS) attacks are dangerous attacks that can cause disruption to server, system or application layer. It will flood the target server with the amount of Internet traffic that the server could not afford at... more
    • by 
    •   5  
      Computer ScienceArtificial IntelligenceMachine LearningFeature Selection
Internet was designed for network services without any intention for secure communication. Exponential growth of internet and its users have developed an era of global competition and rivalry. Denial of service attack by multiple nodes is... more
    • by 
    •   18  
      Computer ScienceDistributed ComputingSecurityDistributed Denial of Service Attack
    • by 
    •   7  
      Computer ScienceHigh Performance ComputingHadoopDDoS
This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The... more
    • by 
    •   11  
      Computer ScienceDoS AttackNetwork ForensicsDigital Forensics
The prevention of any type of cyber attack is indispensable because a single attack may break the security of computer and network systems. The hindrance of such attacks is entirely dependent on their detection. The detection is a major... more
    • by 
    •   16  
      DoS AttackNeural NetworkComputer NetworkIndustrial electronics
This article describes how cloud computing has become a significant IT infrastructure in business, government, education, research, and service industry domains. Security of cloud-based applications, especially for those applications with... more
    • by 
    •   6  
      Information SystemsComputer ScienceDistributed ComputingCloud Computing Security
    • by 
    •   23  
      Distributed ComputingMobile Ad Hoc NetworksWireless CommunicationsNetwork Security
Security MAC Jamming Interference IEEE 802.11 access points deployed in shopping malls, university campuses, crowded streets, airports, and many other locations provide ubiquitous Internet access to millions of stations. However, these... more
    • by 
    •   12  
      EngineeringTechnologyComputer NetworksComputer Software
The main challenge in network security is keeping up with all threat types that arise every day. Traditional security mechanisms such as firewalls and Intrusion Detection System (IDS) do not provide detection for new attacks or helping in... more
    • by 
    •   4  
      Computer ScienceComputer SecurityHoneypotDenial of Service Attack
Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also increasingly using... more
    • by 
    •   9  
      EngineeringInformation SecurityNetwork SecuritySecurity
Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional... more
    • by 
    •   20  
      EngineeringComputer ScienceTechnologyInformation Security
Schwartau (1994) defined information warfare as the application of information and communication technologies to compromise or access an adversary’s technological infrastructure. The purpose is to control, disrupt, disable or access it... more
    • by 
    •   9  
      Information TechnologyInformation SecurityCybercrimesSocial Engineering
... like attacks like Smurf and TCP-SYN uses Rahul Chowdary Bobba(B.Tech), Raghunath. ... San Diego, Jan 2004. [9] HR Nagesh, Chandra Sekaran K. Department of Computer Engineering, PA College of Engineering, Mangalore, Karnataka, INDIA... more
    • by 
    •   11  
      Computer ScienceComputer NetworksAuthenticationDDoS
Distributed Denial of Service attack is a coordinated attack, generally performed on a massive scale on the availability of services of a target system or network resources. Due to the continuous evolution of new attacks and... more
    • by 
    •   32  
      Distributed ComputingInformation TheoryInternet SecurityDistributed Denial of Service Attack
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter. We describe the design of our VoIP Vulnerability Assessment Tool (VVAT) with which... more
    • by 
    •   8  
      Voice over IPDoS AttackOpen SourceVoice Quality
This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of Information Theory, specifically Kolmogorov Complexity. A theorem derived using principles of Kolmogorov... more
    • by 
    •   32  
      Distributed ComputingInformation TheoryInternet SecurityDistributed Denial of Service Attack
Cognitive radio technologies have emerged as a platform to solve the problem of spectrum scarcity for wireless applications since cognitive radios have the potential to utilize the idle licensed spectrum bands in an intelligent way... more
    • by 
    •   14  
      Competitive IntelligenceDynamic Spectrum AccessCognitive radioSystem Design
Summary Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers to be mobile, cable less and communicate with speeds close to the speeds of wired LANs. These features came... more
    • by 
    •   7  
      MAC LayerCost effectivenessWireless LanMobile Computer
Summary Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers to be mobile, cable less and communicate with speeds close to the speeds of wired LANs. These features came... more
    • by 
    •   7  
      MAC LayerCost effectivenessWireless LanMobile Computer
Systems using capabilities to provide preferential service to selected flows have been proposed as a defense against large-scale network denial-of-service attacks. While these systems offer strong protection for established network flows,... more
    • by 
    •   6  
      Network SecuritySecurityNetwork Flowcomputer Communication
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat of browsers being indirectly misused for attack- ing third... more
    • by 
    •   4  
      Anomaly DetectionWeb SecuritySecurity PolicyDenial of Service Attack
The prevention of any type of cyber attack is indispensable because a single attack may break the security of computer and network systems. The hindrance of such attacks is entirely dependent on their detection. The detection is a major... more
    • by 
    •   16  
      DoS AttackNeural NetworkComputer NetworkIndustrial electronics
oice over IP (VoIP) technology is gaining popularity as an alternative to traditional telephony in homes and enterprises. Deployment in homes is fueled by lower-cost services provided by home broadband Internet service providers, VoIP... more
    • by 
    •   3  
      Distributed ComputingElectrical And Electronic EngineeringDenial of Service Attack
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by... more
    • by 
    •   9  
      Computer ScienceQueueing theoryLayoutDenial of Service
Summary Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers to be mobile, cable less and communicate with speeds close to the speeds of wired LANs. These features came... more
    • by 
    •   8  
      MAC LayerCost effectivenessWireless LanMobile Computer
Denial of Service attacks constitute one of the greatest problem in network security. Monitoring traffic is one of the main techniques used in order to find out the existence of possible outliers in the traffic patterns. In this paper, we... more
    • by 
    •   12  
      Network SecurityComputer NetworksNeural NetworkIntrusion Detection
Cyberwarfare has been waged for well over a decade, utilizing methods such as website defacement, data leakage, and distributed denial of service attacks (DDoS). This paper focuses on the latter, attacks that are easily carried out and... more
    • by 
    •   3  
      Distributed Denial of Service AttackDDOS AttackDenial of Service Attack
In 2003, Lin et al. proposed an enhanced protocol of optimal strong-password authentication protocol (OSPA). Recently, Chang and Chang showed that Lin et al.'s protocol is vulnerable to a server spoofing attack and a denial-of-service... more
    • by 
    •   4  
      Smart CardGraphical Password AuthenticationAuthentication ProtocolDenial of Service Attack
The Address Resolution Protocol (ARP) is used by computers to map network addresses (IP) to physical addresses [MAC] and we can't imagine a communications between networks without the support of ARP protocol. However, ARP had been misused... more
    • by 
    •   4  
      Intrusion Detection SystemCurrent TrendsAddress Resolution ProtocolDenial of Service Attack
The pervasive and ubiquitous nature of the Internet coupled with growing concerns for cyber terrorism demand for immediate solutions for securing the Internet infrastructure. So far, the research in Internet security primarily focused on... more
    • by 
    •   5  
      Distributed ComputingInternet SecuritySecurity ProtocolElectrical And Electronic Engineering
A great variety of well-known attacks exist for the IEEE 802.11 protocol. The lack of mechanisms for management frame authentication and the complexity of the protocol itself have derived into a considerable number of denial of service... more
    • by 
    •   4  
      SecurityAnomaly DetectionDenial of ServiceDenial of Service Attack
We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture. It is simple, efficient, and secure; we sketch a proof of the latter property. JFK also has a number of novel... more
    • by 
    •   12  
      Information SystemsComputer ScienceDistributed Denial of Service AttackCryptography
Wireless networks provide an easier way of communication to its users. Network without infrastructure are more flexible in deployment. Ad hoc networks are such networks that do not require a planned infrastructure during its... more
    • by 
    •   3  
      Information SecurityWireless NetworkDenial of Service Attack
Delay tolerant networks (DTNs) are characterized by delay and intermittent connectivity. Satisfactory network functioning in a DTN relies heavily on coordination among participating nodes. However, in practice, such coordination cannot be... more
    • by 
    •   13  
      Computer ScienceDistributed ComputingNetwork SecuritySecurity
In this paper, we propose a novel autonomic service delivery platform for service-oriented network environments. The platform enables a self-optimizing infrastructure that balances the goals of maximizing the business value derived from... more
    • by 
    •   20  
      Information SystemsComputer ScienceDistributed ComputingEnvironmental Economics
There is a continuous struggle for control of resources at every organization that is connected to the Internet. The local organization wishes to use its resources to achieve strategic goals. Some external entities seek direct control of... more
    • by 
    •   4  
      Information SystemsDistributed ComputingWorkload CharacterizationDenial of Service Attack
The cognitive radio enabled IEEE 802.22 wireless regional area network (WRAN) is designed to opportunistically utilize the unused or under-utilized TV bands. However, due to the open paradigm of cognitive radio networks and lack of... more
    • by 
    •   7  
      Distributed ComputingCognitive radioComputer crimeMarkov Process
The Denial of Service Testing Framework (dosTF) being developed as part of the joint India-Australia research project for 'Protecting Critical Infrastructure from Denial of Service Attacks' allows for the construction, monitoring and... more
    • by 
    •   8  
      EngineeringComputer ScienceDistributed Denial of Service AttackReal Time
Abstract. Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and... more
    • by 
    •   8  
      Computer ScienceMobile Ad Hoc NetworksCommunication systemsTelecommunication
Mobile ad hoc networking offers convenient infrastructure-free communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Examples of such attacks include passive... more
    • by 
    •   8  
      Wireless networksAuthenticationMobile Ad Hoc NetworkAd Hoc Networks
This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of information theory, specifically Kolmogorov complexity. The algorithm is based on a concept of Kolmogorov... more
    • by 
    •   32  
      Distributed ComputingInformation TheoryInternet SecurityDistributed Denial of Service Attack
Intrusion detection has, over the last few years, assumed paramount importance within the broad realm of network security, more so in the case of wireless ad hoc networks. These are networks that do not have an underlying infrastructure;... more
    • by 
    •   23  
      Distributed ComputingMobile Ad Hoc NetworksWireless CommunicationsNetwork Security
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and... more
    • by 
    •   6  
      DoS AttackWireless NetworkWireless TechnologyWireless Mesh Network
Wireless Local Area Networks (WLAN) provide connectivity along with flexibility at low cost. Appreciating the exponential growth in this area, Institute of Electrical and Electronics Engineers (IEEE) ratified IEEE standard 802.11 in 1999... more
    • by 
    •   12  
      Computer ScienceNetwork SecurityWireless securityDoS Attack