Denial-of-service attack

Results: 1246



#Item
961Computing / Daemon / Operating system / Application checkpointing / Denial-of-service attack / Server / Computer architecture / Computer network security / Cyberwarfare / Secure Shell

Recovering from intrusions in distributed systems with DARE Taesoo Kim, Ramesh Chandra, and Nickolai Zeldovich MIT CSAIL A BSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
962Network architecture / Denial-of-service attack / Load balancing / Proxy server / Internet Relay Chat flood / Internet security / Prolexic Technologies / SYN flood / Transport Layer Security / Computing / Denial-of-service attacks / Internet

TLP: WHITE National Cybersecurity and Communications Integration Center 29 January[removed]DDoS Quick Guide

Add to Reading List

Source URL: ofi.louisiana.gov

Language: English - Date: 2014-02-07 10:31:08
963Network architecture / Denial-of-service attacks / Internet / Cyberwarfare / Internet standards / Denial-of-service attack / Transmission Control Protocol / NetBIOS / Network Time Protocol / Computing / Internet protocols / Computer network security

Exit from Hell? Reducing the Impact of Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum Abstract Amplification vu

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-07-21 04:13:45
964Cyberwarfare / Computer security / Transmission Control Protocol / Network protocols / Denial-of-service attack / NetBIOS / SYN flood / Internet Protocol / Port / Computer network security / Denial-of-service attacks / Computing

Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Marc K¨uhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany Abstrac

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-07-22 17:07:15
965Spamming / Botnets / Cyberwarfare / Fast flux / Storm Worm / Malware / Denial-of-service attack / Storm botnet / DoSnet / Computer network security / Computing / Multi-agent systems

Botnets – Literature Survey and Report Christian Rossow, Christian J. Dietrich – December 2009 Botnets – Literature Survey and Report Autoren / Authors

Add to Reading List

Source URL: www.internet-sicherheit.de

Language: English - Date: 2010-04-22 07:12:28
966Internet standards / Internet / Software / Port / Transmission Control Protocol / Dynamic Host Configuration Protocol / Ephemeral port / Computer network / Denial-of-service attack / Computing / Computer network security / Internet protocols

Enterprise Security: A Community of Interest Based Approach Patrick McDaniel∗ Subhabrata Sen† Oliver Spatscheck†

Add to Reading List

Source URL: www.patrickmcdaniel.org

Language: English - Date: 2014-09-04 17:29:08
967Cyberwarfare / Botnet / Twitter / Password / Identity theft / Social engineering / Hacker / Smartphone / Denial-of-service attack / Computer network security / Computing / Security

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:43:11
968Internet / Malware / Peer-to-peer / Botnet / Trojan horse / Denial-of-service attack / Attack / Phishing / Computer security / Computer network security / Computing / Cyberwarfare

Reference 30 UNIVERSITY OF ALASKA IT Update - Security Malware Detection and Prevention

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2013-04-03 13:55:01
969Publishing / Mass media / Reference / Americas Quarterly / Denial-of-service attack / Latin script

AMERICAS QUARTERLY Academic Course Packets Professors can now include Americas Quarterly articles and graphics in

Add to Reading List

Source URL: www.americasquarterly.org

Language: English - Date: 2014-03-21 11:05:09
970Internet / Firewall / Router / IP traceback / Denial-of-service attack / IP address spoofing / Ingress filtering / Computer network security / Computing / Network architecture

Pretty Good Packet Authentication Andreas Haeberlen†‡ † Rodrigo Rodrigues†

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2008-10-23 12:44:56
UPDATE