Filters








5,154 Hits in 5.7 sec

A cost-based framework for analysis of denial of service in networks

Catherine Meadows
2001 Journal of Computer Security  
Denial of service is becoming a growing concern.  ...  This paper shows how some principles that have already been used to make cryptographic protocols more resistant to denial of service by trading o the cost to defender against the cost to the attacker can  ...  Portions of this paper appeared previously in 16 .  ... 
doi:10.3233/jcs-2001-91-206 fatcat:srsxrvkrn5cj7gtau7irgvpfvy

A STRIDE Model based Threat Modelling using Unified and-Or Fuzzy Operator for Computer Network Securit

Salman A. Khan
2017 International Journal of Computing and Network Technology  
STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privileges) is a model which covers numerous existing threats that are related to all security properties  ...  In the present era, security has become a fundamental issue in efficient and proper functioning of computer and network systems.  ...  Acknowledgment The author thanks the Deanship of Scientific Research at University of Bahrain for supporting this work under Project # 24/2015.  ... 
doi:10.12785/ijcnt/050103 fatcat:mun23tayvnaxnidfzrefqyahsi

Detection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks

Deepak Vishwakarma, D.S. Rao
2014 International Journal of Computer Applications  
The DOS (denial-of-service), Distributed denial-of-service (DDoS) attacks are a rapidly growing problem. The multitude and variety of both the attacks and the defence approaches is overwhelming.  ...  These attacks influences network resources, denying of service for genuine node and degrades network performance.  ...  Distributed denial-of-service (DDoS) attack is attack, which poses a massive threat to the availability of a resource or service. These attacks are sometimes known as "flooding" attacks.  ... 
doi:10.5120/17844-8747 fatcat:kns2nug6b5bshdpzv2l5apj6xy

An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS

Kuppusamy, Malathi
2011 International journal of network security and its applications  
This is termed as Denial of Service and thus is carried out among the web users and is commonly referred to as Distributed Denial of Service (DDoS).  ...  When the process becomes slow, the ratio of the users accessing to the site also goes down. Apart from this, it may also happen due to the attack of Hackers.  ...  A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its hackers who prevent the efficient functioning  ... 
doi:10.5121/ijnsa.2011.3619 fatcat:o7x6cqriijc6lbm3edonvrs76m

Fuzzy STRIDE Model based on Werners Aggregation Operator for Computer Network Threat Modelling

Salman A. Khan
2017 International Journal of Computing and Digital Systems  
Security has become a significant concern in proper functioning of modern network systems.  ...  Keeping this issue in view, this paper proposes modeling of threats and their risk assessment.  ...  Acknowledgment The author thanks the Deanship of Scientific Research at University of Bahrain for supporting this work through Project # 24/2015. Thanks are also due to Mr.  ... 
doi:10.12785/ijcds/060204 fatcat:n5foi3kc4zb6djg7sfi5ch4g5y

Security analysis for Delay/Disruption Tolerant satellite and sensor networks

N. Bhutta, G. Ansa, E. Johnson, N. Ahmad, M. Alsiyabi, H. Cruickshank
2009 2009 International Workshop on Satellite and Space Communications  
of Service attacks and user anonymity.  ...  In the last few years, Delay/Disruption Tolerant Networking has grown to a healthy research topic because of its suitability for challenged environments characterized by heterogeneity, long delay paths  ...  ACKNOWLEDGMENTS This work was supported by the EU Information Society Technologies SatNEx II Network of Excellence [14].  ... 
doi:10.1109/iwssc.2009.5286339 fatcat:ctjwpklj6zbzfnldbjmmmewyb4

Kitap eleştirisi: Türk sinemasında tarih ve bellek

ÇAYIRCIOĞLU Duygu
2013 İletişim Araştırmaları Dergisi  
Availability Availability guarantees the survivability of network services despite denial-of-service attacks.  ...  Denial-of-Service Attacks A Denial-of-Service (DoS) attack is defined as any event that diminishes or eliminates a network's capacity to perform its expected function (12) .  ... 
doi:10.1501/iltaras_0000000149 fatcat:3ffxhoa5dfgdxfupbcphqel6lu

Enhanced Intrusion Tolerant System for Mobile Payment

Daeyoo Kim, Eugene Rhee
2016 Indian Journal of Science and Technology  
or intruder login, main file access from intruders, and host-based attacks.  ...  the intrusion detection and the safe normal service of the operation system from various malicious attacks.  ...  Zombie smart phones can perform not only distributed denial of service attacks but also mass distributions of malicious spam message.  ... 
doi:10.17485/ijst/2016/v9i46/107185 fatcat:mu7dbrnmvnbdpblujlnrmrev3m

Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud [article]

A.S.Syed Navaz, V.Sangeetha, C.Prabhadevi
2013 arXiv   pre-print
Here to merge Entropy based System with Anomaly detection System for providing multilevel Distributed Denial of Service.  ...  By impersonating legitimate users, the intruders can use a services abundant resources maliciously.  ...  DDoS: it is an attack where multiple compromised systems infected with a Trojans are used to target a single system causing a Denial of Service (DoS) attack.  ... 
arXiv:1308.6745v1 fatcat:odkrhakmmbfolkm6r3cwok5zwi

Classification and Review of Security Schemes in Mobile Computing

Sathish Alampalayam Kumar
2010 Wireless Sensor Network  
those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system.  ...  With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for  ...  Denial-of-Service (DoS) attacks.  ... 
doi:10.4236/wsn.2010.26054 fatcat:gpcyj6ede5bexatbg6eqeda3v4

Formal methods for cryptographic protocol analysis: emerging issues and trends

C. Meadows
2003 IEEE Journal on Selected Areas in Communications  
In this paper we will describe some of the ongoing work in this area, as well as describe some of the new challenges and the ways in which they are being met.  ...  Not only have a number of specialized tools been developed, and general-purpose ones been adapted, but people have begun applying these tools to realistic protocols, in many cases supplying feedback to  ...  Many denial of service attacks can be countered by good resource management (e.g. shutting off parts of a system that are under attack, reallocating resources to parts that are not under attack).  ... 
doi:10.1109/jsac.2002.806125 fatcat:tayyhsybp5d6hhlv5glx4ehe7e

MarketNet

Y. Yemini, A. Dailianas, D. Florissi, G. Huberman
1998 Proceedings of the first international conference on Information and computation economies - ICE '98  
Clients wishing to access a resource must pay in currency acceptable to the domain that owns the resource. An attacker must thus pay to access the resources used in an attack.  ...  A domain can control its exposure to attacks by setting the prices of critical resources and by limiting the currency that it makes available to potential attackers.  ...  The famous denial-of-service attack is a good example of this category of attacks.  ... 
doi:10.1145/288994.289032 fatcat:phj7kxmcgrcuzovwluy3ctlnba

Intrusion Detection Systems, Tools and Techniques – An Overview

S. N. Sheela Evangelin Prasad, M. V. Srinath, Murtaza Saadique Basha
2015 Indian Journal of Science and Technology  
This paper also provides discussion about types of IDS, approaches and types of attacks in the network and intensive literature survey.  ...  Organization's crucial data are highly endangered due to several security attacks and threats. Intrusion is one among such type of threat.  ...  Several types of attacks are: Denial of Service (DoS) Attack Making resources like computing, memory, too busy so that legitimate users can be denied for their request is the main objective of DoS attack  ... 
doi:10.17485/ijst/2015/v8i35/80108 fatcat:pifiagsrwrbvjj5bkiqlpbcspe

A survey of intrusion detection techniques

Sharanya Chandran, K Senthil Kumar
2018 International Journal of Engineering & Technology  
Thus the applications are vulnerable to security issues like phishing attacks, denial of service attacks, cross-site scripting attack and many more.  ...  This paper provides literature review of work done in these areas and their respective mitigations.  ...  All the three systems are subjected to denial of service attacks.  ... 
doi:10.14419/ijet.v7i2.4.13036 fatcat:hzemt5imhbfr7ajvtguya3ixjy

Formal modelling and automatic detection of resource exhaustion attacks

Bogdan Groza, Marius Minea
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
., are vulnerable to denial of service attacks, where adversaries maliciously consume significant resources of honest principals, leading to resource exhaustion.  ...  We propose a set of cost-based rules that formalize DoS attacks by resource exhaustion and can automate their detection.  ...  Acknowledgments This work is supported in part by FP7-ICT-2007-1 project 216471, AVANTSSAR: Automated Validation of Trust and Security of Service-oriented Architectures.  ... 
doi:10.1145/1966913.1966955 dblp:conf/ccs/GrozaM11 fatcat:txkfrfhegjdkbaihr3vysavei4
« Previous Showing results 1 — 15 out of 5,154 results