Sciweavers

319 search results - page 5 / 64
» Denial of Service
Sort
View
COMPSEC
2004
147views more  COMPSEC 2004»
13 years 8 months ago
Characterization of defense mechanisms against distributed denial of service attacks
We propose a characterization of distributed denial of service (DDOS) defenses where reaction points are network-based and attack responses are active. The purpose is to provide a ...
Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Ca...
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 2 months ago
Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks
— Distributed Denial of Service attacks pose a serious threat to many businesses which rely on constant availability of their network services. Companies like Google, Yahoo and A...
Stefan Seufert, Darragh O'Brien
FC
2009
Springer
93views Cryptology» more  FC 2009»
14 years 3 months ago
Detecting Denial of Service Attacks in Tor
Abstract. Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service base...
Norman Danner, Danny Krizanc, Marc Liberatore
TASE
2009
IEEE
14 years 3 months ago
Coarse Grained Retrenchment and the Mondex Denial of Service Attacks
Retrenchment is a framework that allows relatively unrestricted system evolution steps to be described in a way that gives an evolution step some formal content — unlike model b...
Richard Banach
ACNS
2009
Springer
170views Cryptology» more  ACNS 2009»
14 years 3 months ago
Fragility of the Robust Security Network: 802.11 Denial of Service
The upcoming 802.11w amendment to the 802.11 standard eliminates the 802.11 deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper presents two oth...
Martin Eian