Denial-of-service attacks

Results: 652



#Item
141Internet / Network architecture / Smurf attack / Trinoo / IP address spoofing / UDP flood attack / Tribe Flood Network / Stacheldraht / Traffic flow / Denial-of-service attacks / Computing / Denial-of-service attack

D-WARD: DDoS Network Attack Recognition and Defense Ph.D. Dissertation Prospectus Jelena Mirkovi

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-01-24 19:27:00
142Internet / Denial-of-service attacks / Streaming / Teletraffic / Internet standards / Quality of service / Transmission Control Protocol / Packet loss / UDP flood attack / Computing / Network performance / Network architecture

Measuring Denial Of Service Jelena Mirkovic Peter Reiher Sonia Fahmy

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2006-11-28 14:45:19
143Malware / Denial-of-service attacks / SQL Slammer / Computer worm / Dataflow / Vulnerability / Type I and type II errors / System software / Computer security / Cyberwarfare

Vigilante: End-to-End Containment of Internet Worms Manuel Costa Joint work with: Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-12-14 13:39:06
144Cyberwarfare / Computer security / Denial-of-service attack / Internet Relay Chat / Transmission Control Protocol / IP address spoofing / SYN flood / Traffic flow / Packet loss / Computer network security / Denial-of-service attacks / Computing

1 D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks Jelena Mirkovic, Member, IEEE, and Peter Reiher, Member, IEEE

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2005-07-01 17:41:22
145Denial-of-service attack / Internet Relay Chat / Computing / SYN cookies / Transmission Control Protocol / Internet / Denial-of-service attacks / Computer network security / Cyberwarfare

Protocol Analysis and Defeating DDoS in FreeBSD Kernel Playing with Packet Filter Hooks Nebi Şenol YILMAZ Senior Consultant / Managing Partner Secrove Information Security Consulting

Add to Reading List

Source URL: www.secrove.com

Language: English - Date: 2012-05-28 13:15:37
146Computer network security / Computer networking / Routing / Denial-of-service attacks / Denial-of-service attack / Anycast / Border Gateway Protocol / Router / Routing table / Network architecture / Internet / Computing

Shield: DoS Filtering Using Traffic Deflecting

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2012-01-17 14:57:22
147Cyberwarfare / Computer security / Network performance / Denial-of-service attack / Internet Relay Chat / Traffic flow / Transmission Control Protocol / Network congestion / Firewall / Computer network security / Computing / Denial-of-service attacks

Attacking DDoS at the Source Jelena Mirkovi´c Gregory Prier Peter Reiher University of California Los Angeles Computer Science Department 3564 Boelter Hall Los Angeles, CA 90095, USA

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-08-30 17:46:01
148Internet activism / Computing / Operation Payback / Denial-of-service attacks / Prolexic Technologies / Denial-of-service attack

DDoS attack trends 47% increase in total DDoS attacks Y-o-Y*

Add to Reading List

Source URL: www.gts.ro

Language: English - Date: 2014-10-15 11:32:58
149Denial-of-service attacks / Computer network security / Internet standards / Multihoming / Stream Control Transmission Protocol / Streaming / Transmission Control Protocol / Transport layer / Denial-of-service attack / Network architecture / Computing / Internet

SCTP: An innovative transport layer protocol for the web (Position paper) P. Natarajan, J. Iyengar, P. Amer, & R. Stewart

Add to Reading List

Source URL: www2006.org

Language: English - Date: 2006-09-05 12:42:57
150Multi-agent systems / Botnets / Cyberwarfare / Denial-of-service attacks / Zombie / Denial-of-service attack / Email spam / Spam / Srizbi botnet / Computer network security / Computing / Spamming

    TECHNICAL  BRIEF   UNDERSTANDING  BOTNETS  AND  THEIR  SECURITY  CHALLENGES    

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:30
UPDATE