Denial-of-service attacks

Results: 652



#Item
461Social information processing / Computer network security / Blog hosting services / Web 2.0 / Denial-of-service attacks / Myspace / Social networking service / Botnet / Denial-of-service attack / Computing / Internet / World Wide Web

Evaluating Attack Amplification in Online Social Networks Blase E. Ur and Vinod Ganapathy Rutgers University Abstract the user’s friends to post comments. The photo-sharing

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2009-12-18 22:07:42
462SQL Slammer / Computer security / Code Red / Witty / Failure / Morris worm / Computer worms / Cyberwarfare / Denial-of-service attacks

Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-02 14:41:42
463Computer network security / Distributed data storage / Proxy server / Denial-of-service attack / Approx / Peer-to-peer / Web cache / Squid / Content delivery network / Computing / Cache / File sharing networks

Internet Cache Pollution Attacks and Countermeasures Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, and Yan Chen Department of Electrical Engineering and Computer Science Northwestern University, Evanston, IL 60208 {ygao,

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2006-08-11 17:41:19
464Spamming / Botnets / Denial-of-service attacks / Denial-of-service attack / Zombie / Internet security / Storm botnet / BredoLab botnet / Computer network security / Computing / Multi-agent systems

Botnet Economics: Uncertainty Matters Zhen Li Qi Liao, Aaron Striegel Department of Economics and Management Department of Computer Science and Engineering

Add to Reading List

Source URL: weis2008.econinfosec.org

Language: English - Date: 2008-05-09 10:24:17
465Internet / Denial-of-service attacks / Denial-of-service attack / Computing / Cyberwarfare / Domain name system / Radio-frequency identification / Verisign

verisign_ddos-trends_infographic

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-07-09 09:05:20
466Spamming / Cyberwarfare / Botnet / Denial-of-service attacks / Internet Relay Chat / Denial-of-service attack / Computer network security / Computing / Multi-agent systems

Developing Botnets - An Analysis of Recent Activity

Add to Reading List

Source URL: www.team-cymru.com

Language: English - Date: 2014-10-13 13:28:06
467Data / TCP congestion avoidance algorithm / Transmission Control Protocol / Robust random early detection / Network congestion / Denial-of-service attack / Throughput / Traffic flow / Additive increase/multiplicative decrease / Network performance / Computing / Network architecture

1 Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies Aleksandar Kuzmanovic and Edward W. Knightly Abstract— Denial of Service attacks are presenting an increasing threat

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2005-09-15 12:01:58
468Multi-agent systems / Botnets / Denial-of-service attacks / Denial-of-service attack / Malware / Click / Email spam / Proxy server / Storm botnet / Computer network security / Spamming / Computing

PDF Document

Add to Reading List

Source URL: www.team-cymru.com

Language: English - Date: 2014-10-13 13:28:05
469Cyberwarfare / Computer security / Multi-agent systems / Spamming / Denial-of-service attack / Botnet / UDP flood attack / Smurf attack / Ping / Computer network security / Computing / Denial-of-service attacks

DDoS Basics Introduction Distributed Denial of Service (DDoS) attacks are designed to prevent or degrade services provided by a computer at a given Internet Protocol1 (IP) address. This paper will explain, in extremely b

Add to Reading List

Source URL: www.team-cymru.com

Language: English - Date: 2014-10-13 13:28:05
470Data / Network performance / Denial-of-service attacks / Cyberwarfare / Flow control / Transmission Control Protocol / TCP congestion avoidance algorithm / Denial-of-service attack / Packet loss / Computing / Computer network security / Network architecture

A Poisoning-Resilient TCP Stack Amit Mondal and Aleksandar Kuzmanovic Northwestern University {a-mondal, akuzma}@cs.northwestern.edu Abstract— We treat the problem of large-scale TCP poisoning:

Add to Reading List

Source URL: networks.cs.northwestern.edu

Language: English - Date: 2011-04-04 20:37:03
UPDATE