Sciweavers

65 search results - page 8 / 13
» A queueing analysis for the denial of service (DoS) attacks ...
Sort
View
SERSCISA
2009
Springer
14 years 2 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
ARESEC
2011
117views more  ARESEC 2011»
12 years 7 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve
NSDI
2008
13 years 10 months ago
Phalanx: Withstanding Multimillion-Node Botnets
Large-scale distributed denial of service (DoS) attacks are an unfortunate everyday reality on the Internet. They are simple to execute and with the growing prevalence and size of...
Colin Dixon, Thomas E. Anderson, Arvind Krishnamur...
ASIACRYPT
2009
Springer
14 years 2 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...
LCN
2002
IEEE
14 years 23 days ago
Controlled Multicast Framework
The IP multicast has not been widely used by current internet service operators, and part of this relates to the nature of multicast, which is designed to allow any host to receiv...
Rami Lehtonen, Jarmo Harju