Denial-of-service attacks

Results: 652



#Item
21Computing / Internet Relay Chat / Network protocols / Web development / Clientserver model / Inter-process communication / Network architecture / Denial-of-service attack / Transmission Control Protocol / Hypertext Transfer Protocol / Load balancing / Web server

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds Yi-Hsuan Kungk , Taeho Lee† , Po-Ning Tsengk , Hsu-Chun Hsiaok ∗ , Tiffany Hyun-Jin Kim‡ ∗ , Soo Bum Lee§ ∗ , Yue-Hsun

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-09-10 05:14:02
22File sharing networks / Distributed data storage / File sharing / Denial-of-service attacks / BitTorrent / Kad network / EMule / Peer-to-peer / Kademlia / Distributed hash table / EDonkey network / Denial-of-service attack

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:29
23Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Cybercrime / Computer network security / Denial-of-service attack / Computer security / Simple Service Discovery Protocol / Ransomware / Extortion

The 3 Typical Stages of DDoS Extortion Gain an understanding of the tools, actors and motivations to better thwart attacks One of the most popular means to facilitate extortion is through DDoS attacks. These types of att

Add to Reading List

Source URL: info.digitalshadows.com

Language: English - Date: 2016-07-18 12:30:59
24Network protocols / Internet protocols / Denial-of-service attacks / Transmission Control Protocol / Hypertext Transfer Protocol / TCP Fast Open / Traversal Using Relays around NAT / Denial-of-service attack / SYN cookies / Server Message Block

ASAP: A Low-Latency Transport Layer Qingxi Li, Wenxuan Zhou, Matthew Caesar, Brighten Godfrey Dept. of Computer Science, University of Illinois at Urbana-Champaign Urbana, Illinois, USA , wzhou10@illin

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2011-08-01 22:51:35
25Spamming / Transmission Control Protocol / Internet background noise / Backscatter / Denial-of-service attacks

Examining the Internet s Pollution! Karyn Benson! ! 2

Add to Reading List

Source URL: media.defcon.org

Language: English - Date: 2016-07-07 20:55:52
26Cyberwarfare / Denial-of-service attacks / Computer network security / Internet Relay Chat / Denial-of-service attack / DDoS mitigation / Botnet / Computer security / BlockDos / Draft:Corero Network Security

Whitepaper Industrial Control System Security COVER

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-05-16 11:11:13
27Generally Accepted Accounting Principles / Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Financial statements / Statement of changes in equity / Earnings before interest /  taxes /  depreciation /  and amortization / Financial ratio / Balance sheet / Denial-of-service attack / Investment / DDoS mitigation

26 MarchCorero Network Security plc (AIM: CNS) (“Corero” or the “Company”) Full year results

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-03-26 04:51:36
28Cyberwarfare / Denial-of-service attacks / Internet Relay Chat / Computer security / Cybercrime / Harassment / Denial-of-service attack

C:rsro003umentsQQQue2tractsW29_RA_WangAbstract.wpd

Add to Reading List

Source URL: www.misq.org

Language: English - Date: 2016-05-09 11:18:17
29Computer networking / Network protocols / Cyberwarfare / Denial-of-service attacks / Routing / Mobile IP / Content centric networking / IPv6 / Internet Protocol / Peer-to-peer / IP address / Network layer

Where is in a name? A Survey of Mobility in Information-Centric Networks Gareth Tyson1 , Nishanth Sastry2 , Ruben Cuevas3 , Ivica Rimac4 , and Andreas Mauthe5 1 2

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2013-02-18 11:45:51
30Network performance / Internet security / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol / Measuring network throughput / IP address spoofing / TCP congestion control

2015 IEEE Symposium on Security and Privacy Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, †

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:08
UPDATE