Sciweavers

1804 search results - page 13 / 361
» Measuring denial Of service
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 1 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
SEC
2007
13 years 10 months ago
A Survey of Bots Used for Distributed Denial of Service Attacks
Abstract. In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting i...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
ISPEC
2010
Springer
14 years 3 months ago
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles
Harikrishna Narasimhan, Venkatanathan Varadarajan,...
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
14 years 3 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
INFOCOM
2006
IEEE
14 years 3 months ago
Identification of Repeated Denial of Service Attacks
Alefiya Hussain, John S. Heidemann, Christos Papad...