Sciweavers

15 search results - page 1 / 3
» Effectiveness of rate-limiting in mitigating flooding DOS at...
Sort
View
CIIT
2004
131views Communications» more  CIIT 2004»
13 years 10 months ago
Effectiveness of rate-limiting in mitigating flooding DOS attacks
This paper investigates the effectiveness of rate-limiting in mitigating TCP-based flooding Denial of Service (DoS) attacks. Rate-limiting is used as a DoS defense mechanism to di...
Jarmo Mölsä
CCS
2008
ACM
13 years 10 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
CCR
2005
97views more  CCR 2005»
13 years 8 months ago
On the robustness of router-based denial-of-service (DoS) defense systems
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
Ying Xu, Roch Guérin
WCNC
2008
IEEE
14 years 2 months ago
Testbed Implementation of a Secure Flooding Time Synchronization Protocol
Abstract— A fundamental building block in distributed wireless sensor networks is time synchronization. Given resource constrained nature of sensor networks, traditional time syn...
Tanya Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shan...
COMCOM
2006
121views more  COMCOM 2006»
13 years 8 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou