Sciweavers

28 search results - page 5 / 6
» Distributed Divide-and-Conquer Techniques for Effective DDoS...
Sort
View
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 10 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
ACSC
2003
IEEE
14 years 3 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
WWW
2002
ACM
14 years 10 months ago
Protecting electronic commerce from distributed denial-of-service attacks
It is widely recognized that distributed denial-of-service (DDoS) attacks can disrupt electronic commerce and cause large revenue losses. However, effective defenses continue to b...
José Carlos Brustoloni
CN
2008
85views more  CN 2008»
13 years 10 months ago
Pollution attacks and defenses for Internet caching systems
Proxy caching servers are widely deployed in today's Internet. While cooperation among proxy caches can significantly improve a network's resilience to denial-ofservice ...
Leiwen Deng, Yan Gao, Yan Chen, Aleksandar Kuzmano...
ICDCS
2011
IEEE
12 years 9 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu