Sciweavers

171 search results - page 19 / 35
» Autonomic Response to Distributed Denial of Service Attacks
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 1 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
ACSW
2006
13 years 9 months ago
Analysis of traceback techniques
Today's Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP's ...
Udaya Kiran Tupakula, Vijay Varadharajan
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 7 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
IJNSEC
2008
201views more  IJNSEC 2008»
13 years 7 months ago
Detecting and Preventing IP-spoofed Distributed DoS Attacks
In this paper, we explore mechanisms for defending against Distributed Denial of Service (DDoS) attacks, have become one of the major threats to the operation of the Internet toda...
Yao Chen, Shantanu Das, Pulak Dhar, Abdulmotaleb E...
WWW
2010
ACM
14 years 2 months ago
Autonomous resource provisioning for multi-service web applications
Dynamic resource provisioning aims at maintaining the endto-end response time of a web application within a predefined SLA. Although the topic has been well studied for monolithi...
Dejun Jiang, Guillaume Pierre, Chi-Hung Chi