Sciweavers

37 search results - page 4 / 8
» Detecting SYN Flooding Attacks
Sort
View
ICC
2007
IEEE
147views Communications» more  ICC 2007»
14 years 8 days ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque
GECCO
2009
Springer
152views Optimization» more  GECCO 2009»
14 years 15 days ago
Application of evolutionary algorithms in detection of SIP based flooding attacks
The Session Initiation Protocol (SIP) is the de facto standard for user’s session control in the next generation Voice over Internet Protocol (VoIP) networks based on the IP Mul...
M. Ali Akbar, Muddassar Farooq
COMCOM
2008
100views more  COMCOM 2008»
13 years 6 months ago
Traffic flooding attack detection with SNMP MIB using SVM
Jaehak Yu, Hansung Lee, Myung-Sup Kim, Daihee Park
TPDS
2008
130views more  TPDS 2008»
13 years 5 months ago
Detecting VoIP Floods Using the Hellinger Distance
Voice over IP (VoIP), also known as Internet telephony, is gaining market share rapidly and now competes favorably as one of the visible applications of the Internet. Nevertheless,...
Hemant Sengar, Haining Wang, Duminda Wijesekera, S...
ISSA
2004
13 years 7 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche