Sciweavers

94 search results - page 16 / 19
» Detecting Denial of Service Attacks in Tor
Sort
View
110
Voted
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 6 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
102
Voted
TWC
2010
14 years 6 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
CEC
2008
IEEE
15 years 6 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
NETWORKING
2004
15 years 1 months ago
An Efficient Probabilistic Packet Marking Scheme for IP Traceback
Abstract. Denial of Service (DoS) attacks represent a major threat to the availability of Internet services. Identifying the sources of these attacks is considered an important ste...
Basheer Al-Duwairi, Anirban Chakrabarti, Govindara...
63
Voted
SP
2000
IEEE
15 years 4 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop