Denial-of-service attack

Results: 1246



#Item
101Computing / Cyberwarfare / Computer network security / Computer networking / OpenFlow / Network architecture / Software-defined networking / Nox / Firewall / Computer network / Computer security / Denial-of-service attack

A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
102Computing / Network architecture / Computer architecture / Denial-of-service attacks / Cyberwarfare / Emerging technologies / Internet Relay Chat / Network function virtualization / Software-defined networking / Denial-of-service attack / OpenFlow / Virtual firewall

Bohatei: Flexible and Elastic DDoS Defense Seyed K. Fayaz∗ Yoshiaki Tobioka∗ Vyas Sekar∗ ∗ CMU † UIUC

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2015-08-05 21:41:25
103Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
104Network performance / Cyberwarfare / Denial-of-service attacks / Pseudorandom number generator / Measuring network throughput / Network packet / Denial-of-service attack / Network telescope / Witty / Transmission Control Protocol / Code Red / Packet loss

Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event Abhishek Kumar Georgia Institute of Technology

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
105Domain name system / Anycast / Domain Name System Security Extensions / Name server / Denial-of-service attack / Draft:DNS Made Easy / Comparison of DNS server software

| www.dnsmadeeasy.com | IP Anycast+ Enterprise DNS Services MAKING ENTERPRISE DNS SERVICES AN OPTION FOR THE ENTIRE WORLD

Add to Reading List

Source URL: www.dnsmadeeasy.com

Language: English - Date: 2015-12-08 13:37:24
106Decoy / Denial-of-service attacks / Salvatore J. Stolfo / Denial-of-service attack / Honeypot

Baiting Inside Attackers Using Decoy Documents Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo Department of Computer Science Columbia University Abstract. The insider threat remains one of th

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
107Computing / Network architecture / Computer network security / OpenFlow / Cyberwarfare / OSI protocols / Transmission Control Protocol / Software-defined networking / SYN cookies / Denial-of-service attack / Data link layer / Forwarding plane

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks Seungwon Shin† † Vinod Yegneswaran‡

Add to Reading List

Source URL: faculty.cse.tamu.edu

Language: English - Date: 2013-08-28 15:18:02
108

In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, the motives f

Add to Reading List

Source URL: www.coyotus.com

Language: English - Date: 2015-05-07 14:41:02
    109Internet protocols / Secure communication / Internet Standards / Transmission Control Protocol / Relay / Tor / Transport layer / Internet Relay Chat flood / HTTPS / Denial-of-service attack / Quality of service / Internet Relay Chat

    IMUX: Managing Tor Connections from Two to Infinity, and Beyond John Geddes† † Rob Jansen‡

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2014-09-10 17:17:22
    110Computing / Computer network security / Spamming / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Internet bot / Eggdrop / Denial-of-service attack / Email spam / Command and control

    Botnets and Beyond Crimeware in the 21st Century Bill Hayes - CISSP Omaha World-Herald Company

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2008-05-16 20:02:08
    UPDATE