Denial-of-service attacks

Results: 652



#Item
361Denial-of-service attack / Internet Relay Chat / Computing / Denial-of-service attacks / Cyberwarfare / Computer network security

Phoenix Datacom Limited announces extension to its DDoS protection and mitigation capabilities Partnership with Arbor Networks to Combat the Global Rise of DDoS Attacks Targeting Network Security, Business-Critical Appli

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-01-20 04:30:09
362OSI protocols / TCP congestion avoidance algorithm / Transmission Control Protocol / Robust random early detection / Network congestion / Denial-of-service attack / Throughput / Traffic flow / Additive increase/multiplicative decrease / Network performance / Computing / Network architecture

Low-Rate TCP-Targeted Denial of Service Attacks y (The Shrew vs. the Mice and Elephants) Aleksandar Kuzmanovic and Edward W. Knightly ECE/CS Departments Rice University

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2003-07-24 11:26:28
363File sharing networks / Load balancing / Network management / Routing / Client–server model / Denial-of-service attack / SYN flood / Port / Web server / Computing / Denial-of-service attacks / Network performance

Netcalls: End Host Function Calls to Network Traffic Processing Services Justine Sherry Daniel C. Kim Seshadri S. Mahalingam

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2012-07-12 20:27:04
364Network performance / Computer network security / Denial-of-service attacks / Transmission Control Protocol / Netflow / SFlow / Traffic flow / Robust random early detection / Variance / Statistics / Computing / Analysis

Estimating Flow Distributions from Sampled Flow Statistics Nick Duffield Carsten Lund

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2003-07-24 11:26:26
365Cyberwarfare / Computer security / Smurf attack / Ingress filtering / Denial-of-service attack / Firewall / Traceroute / Transmission Control Protocol / Traffic flow / Computer network security / Computing / Denial-of-service attacks

Detecting Spoofed Packets Steven J. Templeton, Karl E. Levitt Department of Computer Science U.C. Davis {templets,levitt}@cs.ucdavis.edu Abstract

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:49:33
366Denial-of-service attacks / Network architecture / Data / Teletraffic / Flow control / Network congestion / Packet loss / Transmission Control Protocol / SYN flood / Network performance / Computer network security / Computing

Persistent Dropping: An Efficient Control of Traffic Aggregates Hani Jamjoom Kang G. Shin

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2003-07-24 11:26:26
367Computer security / Computing / Smurf attack / Denial-of-service attack / SYN flood / IP address spoofing / Ping / LAND / Stateful firewall / Denial-of-service attacks / Computer network security / Cyberwarfare

Configuring DMS Central Control Software to Communicate with VMS Signs Using the PortServer® TS H MEI Serial Server

Add to Reading List

Source URL: ftp1.digi.com

Language: English - Date: 2009-02-03 11:39:26
368Cybercrime / Cyberwarfare / Denial-of-service attacks / Spamming / Denial-of-service attack / Internet Relay Chat / Botnet / Anonymous / Computer network security / Computing / Multi-agent systems

[removed]DDoS Threat Landscape Report Introduction

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2014-03-31 12:42:06
369Internet / Multi-agent systems / Denial-of-service attacks / Botnets / Malware / Zombie / Honeypot / Email spam / Anti-spam techniques / Computer network security / Spamming / Computing

UNIVERSITÀ DEGLI STUDI DI MILANO Facoltà di Scienze Matematiche, Fisiche e Naturali Corso di Laurea in Sicurezza dei Sistemi e delle Reti Informatiche (Crema) The Dorothy Project: inside the Storm An automated platform

Add to Reading List

Source URL: www.honeynet.it

Language: English - Date: 2009-10-17 17:50:33
370System software / Cyberwarfare / Cisco IOS / Routers / Cisco Systems / Denial-of-service attack / Computer worm / Botnet / SQL Slammer / Computing / Denial-of-service attacks / Computer network security

SERVICE PROVIDER INFRASTRUCTURE SECURITY BEST PRACTICES Yusuf Bhaiji – Cisco Systems © 2005 Cisco Systems, Inc. All rights reserved.

Add to Reading List

Source URL: www.menog.org

Language: English - Date: 2012-01-19 09:39:46
UPDATE