Sciweavers

507 search results - page 4 / 102
» Attacking DDoS at the Source
Sort
View
ISCAPDCS
2004
13 years 8 months ago
Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems us...
Stephen M. Specht, Ruby B. Lee
ACSC
2003
IEEE
14 years 21 days ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
SEC
2007
13 years 8 months ago
A Survey of Bots Used for Distributed Denial of Service Attacks
Abstract. In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting i...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
CCR
2004
164views more  CCR 2004»
13 years 7 months ago
A taxonomy of DDoS attack and DDoS defense mechanisms
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents tw...
Jelena Mirkovic, Peter L. Reiher
MSN
2005
Springer
124views Sensor Networks» more  MSN 2005»
14 years 27 days ago
Detecting SYN Flooding Attacks Near Innocent Side
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
Yanxiang He, Wei Chen, Bin Xiao