Sciweavers

37 search results - page 2 / 8
» Detecting SYN Flooding Attacks
Sort
View
INFOCOM
2005
IEEE
13 years 10 months ago
Intentional dropping: a novel scheme for SYN flooding mitigation
— This paper presents a novel scheme to mitigate the effect of SYN flooding attacks. The scheme, called intentional dropping based filtering, is based on the observation of cl...
Basheer Al-Duwairi, G. Manimaran
AINA
2008
IEEE
13 years 11 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
ICON
2007
IEEE
13 years 11 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
JSAC
2006
137views more  JSAC 2006»
13 years 4 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...