3,380 Hits in 6.2 sec

Defending against a Denial-of-Service Attack on TCP

Pars Mutaf
1999 International Symposium on Recent Advances in Intrusion Detection  
This method is based on the intensities of SYN segments which are measured on a network monitoring machine, in realtime.  ...  In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks.  ...  Particularly, the details of a simple denial-of-service attack popularly known as "SYNflooding" were published in two underground magazines and this attack still continues to pose a serious threat against  ... 
dblp:conf/raid/Mutaf99 fatcat:7ijlbeq7orgj3lw532pm362eiy

McAfee SecurityCenter Evaluation under DDoS Attack Traffic

Sirisha Surisetty, Student Member, Sanjeev Kumar
2011 Journal of Information Security  
During the Distributed Denial of Service (DDoS) attacks, computers are made to attack other computers. Newer Firewalls now days are providing prevention against such attack traffics.  ...  In this paper, we present our findings regarding the effectiveness of McAfee SecurityCentre software against some of the popular Distributed Denial Of Service (DDoS) attacks, namely ARP Flood, Ping-flood  ...  TCP-SYN Attack on McAfee SecurityCenter TCP-SYN flood is Layer-4 Denial of Service attack.  ... 
doi:10.4236/jis.2011.23011 fatcat:55eyhqt4f5htfcvy5dl3cjgjq4

Quantifying the Impact of Flood Attack on Transport Layer Protocol

Tyagi S
2014 International Journal on Computational Science & Applications  
In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at  ...  source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down  ...  ACKNOWLEDGEMENTS The authors would like to thank all the researchers and the authors of referred papers for their contribution in this area.  ... 
doi:10.5121/ijcsa.2014.4607 fatcat:aht77x5puzbx3hijcq6hqsaxcq

Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack

Koushicaa Sundar, Sanjeev Kumar
2016 Journal of Information Security  
Experiments were designed to evaluate its in-built security features in defending against a common Distributed Denial of Service (DDoS) attack, namely the TCP-SYN based DDoS attack.  ...  Surprisingly, it was found that the Windows Server 2012 R2 OS lacked sufficient host-based protection and was found to be unable to defend against even a medium intensity3.1 Gbps-magnitude of TCP-SYN attack  ...  to a denial of service (Figure 2 ).  ... 
doi:10.4236/jis.2016.74018 fatcat:bjiefzkfmrdczcifcg7if2ga5i

Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks

Sanjeev Kumar, Raja Sekhar Reddy Gade
2012 Journal of Information Security  
Recent Denial of Service (DoS) attack on Independence Day weekend, on July 4th, 2009 launched to debilitate the US and South Korean governments' websites is indicative of the fact that the security systems  ...  IPS is a vital security device which is commonly used as a front line defense mechanism to defend against such DoS attacks.  ...  Cisco claims as they are a step forward in defending against these Denials of service attacks.  ... 
doi:10.4236/jis.2012.32015 fatcat:ataxwntp6zcpxlenjtaz3ink4q

Evaluation of Microsoft Windows Servers 2008 & 2003 against Cyber Attacks

Sanjeev Kumar, Senior Member, Raja Sekhar Reddy Gade
2015 Journal of Information Security  
Widely deployed Microsoft's Windows 2003 & 2008 servers provide some built-in protection against common Distributed Denial of Service (DDoS) attacks, such as TCP/SYN attack.  ...  In this paper, we evaluate the performance of built-in protection capabilities of Windows servers 2003 & 2008 against a special case of TCP/SYN based DDoS attack.  ...  of server 2008 with service pack) to defend on its own against the TCP/SYN based network attacks.  ... 
doi:10.4236/jis.2015.62016 fatcat:336vepjitradpjuhf7hmo3yrxy

Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack [chapter]

Zohair Ihsan, Mohd. Yazid Idris, Khalid Hussain, Deris Stiawan, Khalid Mahmood Awan
2011 Communications in Computer and Information Science  
Based on these two characteristics, a UDP bandwidth attack detection system based on Protocol Share Based Traffic Rate Analysis (PSBTRA) is proposed.  ...  There are two main characteristics of bandwidth attack. First, during an attack the incoming traffic rate is much higher than the outgoing traffic rate.  ...  "Distributed denial of service attack is a denial of service attack, in which a multitude of attackers performs denial of service attacks in a coordinated manner to one or more targets."  ... 
doi:10.1007/978-3-642-25327-0_24 fatcat:s7lxljx27zbrng6izde6v53ysm

Entropy-based input-output traffic mode detection scheme for DoS/DDoS attacks

Suratose Tritilanunt, Suphannee Sivakorn, Choochern Juengjincharoen, Ausanee Siripornpisan
2010 2010 10th International Symposium on Communications and Information Technologies  
The most common type of DoS attack occurs when adversaries flood a large amount of bogus data to interfere or disrupt the service on the server.  ...  Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service unavailability to legitimate users in the internetworking  ...  DENIAL-OF-SERVICE ATTACKS OVERVIEW Denial-of-Service attacks (DoS) are a technique to attack against computers connected to the Internet.  ... 
doi:10.1109/iscit.2010.5665097 fatcat:4y2jt53r7nh3zdieeviub3yta4

Detection of DDoS attacks in Windows Communication Foundation Services

S. Shalini
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
In this paper, we have presented a mechanism to detect a nd defense a web-server against a Distributed Denial of Service (DDoS) attack.  ...  Then, the attack is monitored in resource monitor of the server side monitor showing CPU utilization.Also,some defense mechanisms to defend the server against such attacks has been presented.  ...  The methodology of how the attack has been done on shopping portal application with results has been shown in section 4.Also some defense mechanisms to defend server against such attacks has been proposed  ... 
doi:10.17762/ijritcc2321-8169.150294 fatcat:7jpcydfjdzgyfivhcihlt25jsy


Gupta BB
2008 International Journal on Information Sciences and Computing  
Distributed Denial of Service (DDoS) attacks, one of the latest and most powerful threats that have appeared to the Internet can disrupt the availability of Internet services completely, by eating either  ...  This provides better understanding of the problem, current solution space and future to defend against DDoS attacks.  ...  [6] Describes what Denial of Service (DoS) attacks are, how they can be carried out in IP networks, and how one can defend against them. Here, goal is not to implement all possible defenses.  ... 
doi:10.18000/ijisac.50019 fatcat:idcvf7lyh5cpli26zvz67nxz3q


Arun Kumar Singh
2017 International Journal of Advanced Research in Computer Science  
DDoS distributed denial of service attacks are another contiguous type of attack over the availability of Internet resources.  ...  So it is imperative develop complete expositions for defending against known attack variants of such kinds.  ...  DOS OR DENIAL OF SERVICE ATTACK Dos or Denial-of-service attacks is a common term that validates a resource depleting attack over a server, internet infrastructure such that the server is not able to provide  ... 
doi:10.26483/ijarcs.v8i9.4903 fatcat:pcoipmj7nvdkfpqwxzlj7b2kku

AccFlow: Defending Against the Low-Rate TCP DoS Attack in Wireless Sensor Networks [article]

Yuan Cao and Lijuan Han and Xiaojin Zhao and Xiaofang Pan
2019 arXiv   pre-print
Furthermore, while AccFlow is designed to solve the low-rate TCP DoS attack, we demonstrate that AccFlow can also effectively defend against general DoS attacks which do not rely on the TCP retransmission  ...  Because of the open nature of the Wireless Sensor Networks (WSN), the Denial of the Service (DoS) becomes one of the most serious threats to the stability of the resourceconstrained sensor nodes.  ...  LOW-RATE TCP DOS ATTACK In this section we briefly introduce the low-rate TCP DoS attack and its effectiveness to cause denial of service to legitimate TCP flows.  ... 
arXiv:1903.06394v1 fatcat:3manylv74ber5nxvmvuw7mvzui

Network Bandwidth Denial of Service (DoS) [chapter]

David Naccache, Mike Just, Bart Preneel, Angelos D. Keromytis, Xiaowei Yang, Marc Vauclair, Nicolas Sendrier, Darrel Hankerson, Alfred Menezes, Donggang Liu, Berry Schoenmakers, Caroline Fontaine (+15 others)
2011 Encyclopedia of Cryptography and Security  
DoS (DDoS) Definition Network bandwidth denial of service (DoS) attacks seek to consume the available bandwidth or router resources at or near a target host or network, such that legitimate traffic cannot  ...  Synonyms Network flooding attack, packet flooding attack, network DoS Related Concepts and Keywords SYN flood attack, application-level DoS, algorithmic DoS, memory and state exhaustion DoS, distributed  ...  The problem of detecting and defending against bandwidth denial of service attacks in open networks, and specifically in the Internet, remains unsolved.  ... 
doi:10.1007/978-1-4419-5906-5_271 fatcat:nj6uvvdulnasrbxo6chntsurpi

Three Counter Defense Mechanism for TCP SYN Flooding Attacks

S. Gavaskar, R. Surendiran, E. Ramaraj
2010 International Journal of Computer Applications  
We are focusing Distributed Denial of Service; there is plenty of Denial of Service mechanism existed in that we took SYN Flood attacks.  ...  With this view my proposed work is, an efficient method to detecting and mitigation against TCP SYN flooding attacks using Three Counters Algorithm, which detects spoofed IP packets up to 80%.  ...  Distributed Denial of Service (DoS) attack is an attack on the availability of Internet services and resources.  ... 
doi:10.5120/1083-1399 fatcat:xieelg7hcfeyvo45jvppsrllfi

Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks [chapter]

Jung-Taek Seo, Cheol-Ho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
2005 Lecture Notes in Computer Science  
We present a probabilistic packet filtering (PPF) mechanism to defend the Web server against Distributed Denial-of-Service (DDoS) attacks.  ...  To distinguish abnormal traffics from normal ones, we use Traffic Rate Analysis (TRA).  ...  Introduction These days, Web environments are very vulnerable Distributed Denial-of-Service (DDoS) attacks [1] , [2] .  ... 
doi:10.1007/11577188_50 fatcat:ht4oq5vvx5hf5hozmdfhpsfdaa
« Previous Showing results 1 — 15 out of 3,380 results