Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Ping of death"'
Autor:
Etza novarita
Publikováno v:
Elkom : Jurnal Elektronika dan Komputer. 14:268-277
Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is
Publikováno v:
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING. 5:112-121
Data communication, computers and computer networks increase the needs and facilitation offered by a variety of server services that are owned by individuals and companies. Servers are the core of continuous communication on the internet and the main
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 3, Iss 1, Pp 66-71 (2005)
A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large p
Externí odkaz:
https://doaj.org/article/443c040064b8448c96e707355fc4f107
Publikováno v:
2021 9th International Conference on Cyber and IT Service Management (CITSM).
Security of data and information in servers connected to networks that provide services to user computers, is the most important thing to maintain data privacy and security in network security management mechanisms. Weaknesses in the server security
Autor:
Asrin Abdollahi, Mohammad Fathi
Publikováno v:
Wireless Personal Communications. 112:2057-2070
Internet of things (IoT) is almost vulnerable to cyber security attacks due to the limited computational resources of conventional IoT devices. In this paper, ping of death as a cyber security attack is modeled for IoT networks. Attackers increase th
Autor:
Amandeep Singh Dhaliwal
Distributed Denial of Service (DDoS) constitutes major threat to both traditional and SDN networks. An attacker can launch a DDoS attack to exhaust either the controller or other network resources, such as switches, or both. There are different DDoS
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3a43c526679c1e35714913c26d6f26f1
https://doi.org/10.32920/ryerson.14647329.v1
https://doi.org/10.32920/ryerson.14647329.v1
Publikováno v:
J-ICON : Jurnal Komputer dan Informatika; Vol 9 No 1 (2021): March 2021; 45-55
J-ICON : Jurnal Komputer dan Informatika; Vol 9 No 1 (2021): Maret 2021; 45-55
J-ICON : Jurnal Komputer dan Informatika; Vol 9 No 1 (2021): Maret 2021; 45-55
Security is inversely proportional to comfort, the more comfortable the application of technology will have an impact on the security side of the system. The Server is an important infrastructure in managing data. It is important to prevent attacks o
Autor:
Mohammed Abdulaziz Ikram, Ryan Alturki, Asrin Abdollahi, Mohammad Dahman Alshehri, Shahzad Khan, Hasan J. Alyamani, Inam Ullah Khan
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2021 (2021)
The Internet of Things (IoT) plays an important role to connect people, data, processes, and things. From linked supply chains to big data produced by a large number of IoT devices to industrial control systems where cybersecurity has become a critic
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811573934
The computing world was revolutionized when the concept of Cloud Computing emerged. Cloud Computing became a solution to various problems of organizations from small scale to large scale organizations thanks to the benefits associated with it which i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c0b3a97c06b86f67e241d451421868ed
https://doi.org/10.1007/978-981-15-7394-1_23
https://doi.org/10.1007/978-981-15-7394-1_23
Publikováno v:
Recent Studies on Computational Intelligence ISBN: 9789811584688
Numerous attacks are performed on network infrastructures. These include attacks on network availability, confidentiality and integrity. Distributed denial-of-service (DDoS) attack is a persistent attack which affects the availability of the network.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6819373361a35b150a8aa0b088a510ba
https://doi.org/10.1007/978-981-15-8469-5_5
https://doi.org/10.1007/978-981-15-8469-5_5