Denial-of-service attack

Results: 1246



#Item
331Data / IP traceback / Denial-of-service attack / IP address spoofing / IP fragmentation attacks / Firewall / Transmission Control Protocol / Ping / Communications protocol / Computer network security / Computing / Network architecture

Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2007-07-15 10:32:33
332Internet / Computing / Internet protocols / Denial-of-service attack / Internet Relay Chat / Dns.com / Network architecture / Domain name system / Computer network security / Denial-of-service attacks

THE DEMANDS OF THE INTERNET ARE CHANGING $1,500,000,000,000 e-commerce sales will reach $1.5 trillion globally inYOUR CUSTOMERS ARE MORE EXPOSED THAN EVER BEFORE

Add to Reading List

Source URL: www.ariservices.com

Language: English - Date: 2015-04-08 22:19:38
333Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Data security / IP address spoofing / Transmission Control Protocol / Traffic flow / SYN flood / Computer network security / Denial-of-service attacks / Cyberwarfare

Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
334Internet / Computer security / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / IP address spoofing / Proxy server / Transmission Control Protocol / IP traceback / Computer network security / Computing / Denial-of-service attacks

1 An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks Vern Paxson AT&T Center for Internet Research at ICSI

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-06-26 22:54:56
335Social information processing / Computer network security / Blog hosting services / Web 2.0 / Denial-of-service attacks / Myspace / Social networking service / Botnet / Denial-of-service attack / Computing / Internet / World Wide Web

Evaluating Attack Amplification in Online Social Networks Blase E. Ur and Vinod Ganapathy Rutgers University Abstract the user’s friends to post comments. The photo-sharing

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
336Mydoom / Simple Mail Transfer Protocol / Sobig / MX record / Computer worm / Port / Transmission Control Protocol / Backscatter / Denial-of-service attack / Email / Computer-mediated communication / Computing

A Study of Mass-mailing Worms Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA, 15213 {cindywon, bielski, jonmccune, chenxi}@cmu.edu

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-04 03:14:45
337Denial-of-service attack / System software / Internet security / Cyberspace / Smurf attack / SYN flood / Transmission Control Protocol / Ping / Denial-of-service attacks / Computer network security / Computing

Past and Future Internet Disasters: DDoS attacks survey and analysis Thomas Dübendorfer <> Arno Wagner <> April 8th, 2003

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2003-06-26 15:18:01
338Computer security / Parallel computing / Network processor / Intrusion prevention system / Communications protocol / Network switch / Denial-of-service attack / Transmission Control Protocol / Snort / Computer network security / Computing / Cyberwarfare

Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson,1 K. Asanovi´c,2 S. Dharmapurikar,3 J. Lockwood,4 R. Pang,5 R. Sommer,1 N. Weaver1 Abstract The performance pressures on implementing e

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-07-08 02:12:10
339Digital media / Computer network security / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Athena / Verisign / Load balancing / Computing / Denial-of-service attacks / Greek mythology

Athena_Infographic_FINAL_6.13

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-06-20 15:35:04
340Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:31:11
UPDATE