Razmov, 2000 - Google Patents
Denial of service attacks and how to defend against themRazmov, 2000
View PDF- Document ID
- 17112590157924730787
- Author
- Razmov V
- Publication year
- Publication venue
- University of Washington
External Links
Snippet
This paper is a survey on the problem of denial-of-service (DoS) attacks and proposed ways to deal with it. We describe the nature of the problem and look for its root causes, further presenting brief insights and suggested approaches for defending against DoS. We point …
- 210000003702 immature single positive T cell 0 description 8
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gu et al. | Denial of service attacks | |
Mirkovic et al. | A taxonomy of DDoS attack and DDoS defense mechanisms | |
Douligeris et al. | DDoS attacks and defense mechanisms: classification and state-of-the-art | |
Peng et al. | Survey of network-based defense mechanisms countering the DoS and DDoS problems | |
Feng et al. | Design and implementation of network puzzles | |
Durcekova et al. | Sophisticated denial of service attacks aimed at application layer | |
Yang et al. | A DoS-limiting network architecture | |
Abliz | Internet denial of service attacks and defense mechanisms | |
Beitollahi et al. | Analyzing well-known countermeasures against distributed denial of service attacks | |
US8171562B2 (en) | System and methods for protecting against denial of service attacks | |
US20060075491A1 (en) | Network overload detection and mitigation system and method | |
Rajkumar | A survey on latest DoS attacks: classification and defense mechanisms | |
Mölsä | Mitigating denial of service attacks: A tutorial | |
Jeyanthi et al. | Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment | |
Meena et al. | Distributed denial of service attacks and their suggested defense remedial approaches | |
Safa et al. | A collaborative defense mechanism against SYN flooding attacks in IP networks | |
Ma | Mitigating denial of service attacks with password puzzles | |
Jayaswal et al. | Internet hack back: Counter attacks as self-defense or vigilantism? | |
Kumar et al. | An integrated approach for defending against distributed denial-of-service (DDoS) attacks | |
Gulihar et al. | Anomaly based mitigation of volumetric ddos attack using client puzzle as proof-of-work | |
Ghorbani et al. | Network attacks | |
Prasad et al. | IP traceback for flooding attacks on Internet threat monitors (ITM) using Honeypots | |
Razmov | Denial of service attacks and how to defend against them | |
Bocan | Developments in DOS research and mitigating technologies | |
Haggerty et al. | Beyond the perimeter: the need for early detection of denial of service attacks |