Denial-of-service attacks

Results: 652



#Item
511Cyberwarfare / Denial-of-service attack / Stefan Savage / Computer worm / Warhol worm / Botnet / Internet security / Tor / Firewall / Computer network security / Computing / System software

Report on DIMACS∗ Workshop on Large-scale Internet Attacks Date of workshop: September 23 – 24, 2003 Workshop Organizers: Vern Paxson, ICSI Center for Internet Research Steve Bellovin, AT&T Labs-Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-02-19 13:06:20
512Spamming / Cyberwarfare / Botnets / Denial-of-service attacks / Storm botnet / Denial-of-service attack / Peer-to-peer / Malware / ANts P2P / Computer network security / Computing / Multi-agent systems

P2P as botnet command and control: a deeper insight David Dittrich Applied Physics Laboratory University of Washington [removed]

Add to Reading List

Source URL: staff.washington.edu

Language: English - Date: 2008-10-10 19:28:45
513Denial-of-service attack / Internet Relay Chat / Computing / Internet / Prolexic Technologies / Denial-of-service attacks / Computer network security / Cyberwarfare

Distributed Denial of Service Attacks Against Human Rights Sites Hal Roberts Berkman Center for Internet & Society at Harvard University

Add to Reading List

Source URL: cyberexpo.memphis.edu

Language: English - Date: 2011-07-14 16:30:14
514Denial-of-service attacks / Internet / Cyberwarfare / IP traceback / IP address spoofing / Denial-of-service attack / Firewall / Router / Packet switching / Computing / Network architecture / Computer network security

MULTOPS: a data-structure for bandwidth attack detection Thomer M. Gil and Massimiliano Poletto Vrije Universiteit, Amsterdam, The Netherlands and M.I.T., Cambridge, MA, USA {thomer,maxp}@lcs.mit.edu

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
515Network architecture / Denial-of-service attack / UDP flood attack / Transmission Control Protocol / IP address spoofing / Robust random early detection / Router / Broadcast radiation / Network congestion / Denial-of-service attacks / Computer network security / Computing

MULTOPS: a data structure for denial-of-service attack detection by Thomer M. Gil [removed] Submitted to the Division of Mathematics and Computer Science

Add to Reading List

Source URL: thomer.com

Language: English - Date: 2011-05-03 01:42:43
516Multi-agent systems / Cyberwarfare / Spamming / Computer security / Denial-of-service attack / Internet Relay Chat / Botnet / Load balancing / Transmission Control Protocol / Computer network security / Computing / Denial-of-service attacks

On Measuring the Impact of DDoS Botnets Arne Welzel Christian Rossow Herbert Bos

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-03-31 07:00:45
517Multi-agent systems / Spamming / Botnet / Denial-of-service attacks / Inter-process communication / Internet security / Communications protocol / Netflow / Transmission Control Protocol / Computing / Computer network security / Data

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2012-12-13 01:27:31
518Network architecture / Denial-of-service attack / Load balancing / Proxy server / Internet Relay Chat flood / Internet security / Prolexic Technologies / SYN flood / Transport Layer Security / Computing / Denial-of-service attacks / Internet

TLP: WHITE National Cybersecurity and Communications Integration Center 29 January[removed]DDoS Quick Guide

Add to Reading List

Source URL: ofi.louisiana.gov

Language: English - Date: 2014-02-07 10:31:08
519Network architecture / Denial-of-service attacks / Internet / Cyberwarfare / Internet standards / Denial-of-service attack / Transmission Control Protocol / NetBIOS / Network Time Protocol / Computing / Internet protocols / Computer network security

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum Abstract Amplification vu

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-07-21 04:13:45
520Cyberwarfare / Computer security / Transmission Control Protocol / Network protocols / Denial-of-service attack / NetBIOS / SYN flood / Internet Protocol / Port / Computer network security / Denial-of-service attacks / Computing

Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany Abstrac

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-07-22 17:07:15
UPDATE