Sciweavers

483 search results - page 5 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
SASN
2005
ACM
14 years 2 months ago
Defending against path-based DoS attacks in wireless sensor networks
Denial of service (DoS) attacks can cause serious damage in resourceconstrained, wireless sensor networks (WSNs). This paper addresses an especially damaging form of DoS attack, c...
Jing Deng, Richard Han, Shivakant Mishra
CCS
2003
ACM
14 years 1 months ago
DoS protection for UDP-based protocols
Since IP packet reassembly requires resources, a denial of service attack can be mounted by swamping a receiver with IP fragments. In this paper we argue how this attack need not ...
Charlie Kaufman, Radia J. Perlman, Bill Sommerfeld
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 2 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
IJHPCN
2008
75views more  IJHPCN 2008»
13 years 8 months ago
Enhancing GridFTP performance using intelligent gateways
: To improve throughput of grid data servers under heavy loads or under denial of service attacks, it is important to service requests differentially, giving preference to ongoing ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
MIDDLEWARE
2007
Springer
14 years 2 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka