SYN flood

Results: 71



#Item
11Internet / Internet protocols / Teletraffic / Network performance / Computer network security / Transmission Control Protocol / Denial-of-service attack / SYN flood / Quality of service / Computing / Denial-of-service attacks / Network architecture

1 Accurately Measuring Denial of Service in Simulation and Testbed Experiments Jelena Mirkovic Member, IEEE, Alefiya Hussain, Sonia Fahmy Senior Member, IEEE, Peter Reiher Member, IEEE, Roshan K. Thomas

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2009-07-27 18:05:25
12Computing / TCP/IP / SYN flood / Data security / Denial-of-service attack / Cyberspace / Transmission Control Protocol / SYN cookies / UDP flood attack / Computer network security / Denial-of-service attacks / Cyberwarfare

ERT THREAT ALERT Tsunami SYN Flood Attack ERT Threat Alert Tsunami SYN Flood Attack, Oct 7, 2014

Add to Reading List

Source URL: security.radware.com

Language: English - Date: 2014-10-07 17:23:37
13Internet standards / Network architecture / Routing / PCCW / Pacific Century Group / Default-free zone / Border Gateway Protocol / YouTube / IP hijacking / Internet / Computing / Internet protocols

Pakistan Telecom Hijacks YouTube Or how to SYN-flood DOS yourself while annoying everyone on on the planet APRICOT Taipei 2008

Add to Reading List

Source URL: research.dyn.com

Language: English - Date: 2014-07-27 14:34:20
14Cyberwarfare / Network architecture / Data security / IP address spoofing / Denial-of-service attack / SYN flood / Transmission Control Protocol / Ingress filtering / Firewall / Computer network security / Denial-of-service attacks / Computing

RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2010-12-13 19:36:16
15Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Data security / IP address spoofing / Transmission Control Protocol / Traffic flow / SYN flood / Computer network security / Denial-of-service attacks / Cyberwarfare

Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
16Denial-of-service attack / System software / Internet security / Cyberspace / Smurf attack / SYN flood / Transmission Control Protocol / Ping / Denial-of-service attacks / Computer network security / Computing

Past and Future Internet Disasters: DDoS attacks survey and analysis Thomas Dübendorfer <> Arno Wagner <> April 8th, 2003

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2003-06-26 15:18:01
17Denial-of-service attack / SYN flood / Transmission Control Protocol / Blue / Traffic flow / Ingress filtering / UDP flood attack / IP address spoofing / Computer network security / Denial-of-service attacks / Computing

IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2008-11-14 18:01:53
18Cyberspace / Denial-of-service attack / IP address spoofing / SYN flood / UDP flood attack / Smurf attack / Firewall / Transmission Control Protocol / Internet security / Computer network security / Denial-of-service attacks / Computing

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗ Jelena Mirkovic

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2005-06-22 14:30:02
19Denial-of-service attack / Cyberspace / Internet security / SYN flood / Stefan Savage / Denial-of-service attacks / Computer network security / Computing

A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms Jelena Mirkovic, Janice Martin and Peter Reiher Computer Science Department University of California, Los Angeles Technical report #020018

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-05-01 03:16:24
20Transmission Control Protocol / Internet protocol suite / Communications protocol / Lively Kernel / SYN flood / Sockstress / Computing / Data / Information

STEPS Toward The Reinvention of Programming, 2008 Progress Report Submitted to the National Science Foundation (NSF) October 2008 A. Kay, I. Piumarta, K. Rose, D. Ingalls, D. Amelang, T. Kaehler, Y. Ohshima, H. Samimi, C

Add to Reading List

Source URL: www.vpri.org

Language: English - Date: 2015-01-21 19:13:18
UPDATE