Zobrazeno 1 - 10
of 32
pro vyhledávání: '"SYN cookies"'
Autor:
Li Zhao
Publikováno v:
Journal of Computational Methods in Sciences and Engineering. 19:241-246
Publikováno v:
EuroP4@CoNEXT
The SYN flood attack is a common attack strategy as part of Distributed Denial-of-Service, which steadily becomes more frequent and of higher volume. To defend against SYN floods, preventing valuable service downtime, malicious traffic has to be sepa
Publikováno v:
Software: Practice and Experience. 48:740-749
Summary The Internet protocol suite is increasingly used on devices with constrained resources that operate as both clients and servers within the Internet of Things paradigm. However, these devices usually apply few—if any—security measures. The
Autor:
Edoardo Biagioni
Publikováno v:
ICNC
An attacker wishing to flood a network with excess amounts of network traffic may send UDP packets with a spoofed IP source address corresponding to the target network. In many cases servers then amplify the attack by replying to the target network w
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319763538
IBICA
IBICA
Network Intrusion Detection and Prevention Systems (NIDPS) are widely used to detect and thwart malicious activities and attacks. However, the existing NIDPS are monolithic/centralized, and hence they are very limited in terms of scalability and resp
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e61d8f6acd5661b79cfc6bb923a2ec72
https://doi.org/10.1007/978-3-319-76354-5_29
https://doi.org/10.1007/978-3-319-76354-5_29
Publikováno v:
Science-based technologies. 36
In this article, the process of constructing an imitation polygon as a method for studying the behavior of the system of protection of critical information resources is considered. The graphical network simulator application is used to construct the
Publikováno v:
Mobile, Secure, and Programmable Networking ISBN: 9783319678061
MSPN
MSPN
This paper describes the modeling of a network’s server under SYN/TCP attack, using Deterministic and Stochastic Petri Nets, which is a formalism allowing qualitative and quantitative analysis for the modeled system. This high level formalism allow
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a0e676239ab080f0a57d692ef1be98fe
https://doi.org/10.1007/978-3-319-67807-8_6
https://doi.org/10.1007/978-3-319-67807-8_6
Publikováno v:
Applied Sciences, Vol 6, Iss 11, p 358 (2016)
Applied Sciences; Volume 6; Issue 11; Pages: 358
Applied Sciences; Volume 6; Issue 11; Pages: 358
Distributed denial of service attacks have become more and more frequent nowadays. In 2013, a massive distributed denial of service (DDoS) attack was launched against Spamhaus causing the service to shut down. In this paper, we present a three-way ha
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ICC
To provide network services consistently under various network failures, enterprise networks increasingly utilize path diversity through multi-homing. As a result, multi-homed non-transit autonomous systems become to surpass single-homed networks in