Denial-of-service attacks

Results: 652



#Item
381Cyberwarfare / Internet / Internet privacy / Multi-agent systems / Denial-of-service attack / Internet Relay Chat / SYN cookies / Botnet / SYN flood / Computer network security / Computing / Denial-of-service attacks

Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds Srikanth Kandula Dina Katabi MIT {kandula,dina}@csail.mit.edu

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2006-09-21 21:38:54
382Denial-of-service attack / Internet Relay Chat / Computing / Prolexic Technologies / Denial-of-service attacks / Computer network security / Cyberwarfare

GLOBAL IT SECURITY RISKS SURVEY 2014 – DISTRIBUTED DENIAL OF SERVICE (DDoS) ATTACKS KASPERSKY LAB

Add to Reading List

Source URL: press.kaspersky.com

Language: English - Date: 2014-11-18 11:22:49
383Internet / Cyberwarfare / Denial-of-service attacks / Internet standards / Network address translation / IP address spoofing / Ping / Denial-of-service attack / IP address / Computing / Computer network security / Network architecture

Understanding the Efficacy of Deployed Internet Source Address Validation Filtering Robert Beverly Arthur Berger

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2009-11-23 23:36:37
384Network architecture / Denial-of-service attacks / Internet Protocol / Domain name system / Cyberwarfare / Denial-of-service attack / Botnet / Voice over IP / Critical infrastructure protection / Internet / Computing / Computer network security

( Worldwide Infrastructure Security Report 2010 Report

Add to Reading List

Source URL: ipv6.org.sa

Language: English - Date: 2014-09-04 07:39:40
385Computer network security / Denial-of-service attacks / Computing / Network performance / Artificial neural network / Random neural network / Robust random early detection / Intrusion detection system / Denial-of-service attack / Statistics / Neural networks / Computational neuroscience

A Denial of Service Detector based on Bayesian Classifiers and the Random Neural Network ¨ ∗ and Georgios Loukas G¨ ulay Oke Electrical and Electronic Engineering, Imperial College London, UK

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2007-04-30 15:58:30
386Applied mathematics / Mathematics / Denial-of-service attacks / ReDoS / Formal languages / Tac / Algorithm / Time complexity / Parsing / Regular expressions / Pattern matching / Theoretical computer science

Securing Applications With CHECKMARX

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:10
387Akamai Technologies / Content delivery network / Network architecture / Denial-of-service attacks / Presidency of Barack Obama / Barack Obama / Domain Name System / Denial-of-service attack / Computing / Internet / Computer network security

Microsoft Word - SecurityBulletin-Crafted DNS Text[removed]docx

Add to Reading List

Source URL: www.stateoftheinternet.com

Language: English - Date: 2014-11-11 06:13:18
388Denial-of-service attack / Internet Relay Chat / Christmas music / Denial-of-service attacks / Computer network security / Cyberwarfare

Christmas.com Keeping Christmas online You may find it hard to believe, but there are people out there who dislike Christmas: virtual Grinches trying to ruin the fun for the rest of us. Christmas.com, a beacon of holiday

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2015-02-13 18:37:14
389Internet / Network architecture / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Routing / Anycast / Load balancing / SYN flood / Denial-of-service attacks / Computer network security / Computing

Datasheet DDoS Protection Automated Mitigation of the Largest and Smartest DDoS Attacks

Add to Reading List

Source URL: www.incapsula.com

Language: English - Date: 2015-02-16 04:58:34
390Spamming / Computing / Cyberwarfare / Denial-of-service attack / Botnet / Prolexic Technologies / Computer network security / Denial-of-service attacks / Multi-agent systems

Managed DDOS Protection Service – Level 2 Protect Your Online Services From DDoS Attacks

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2014-02-19 04:11:51
UPDATE