Abstract: In this paper, we propose a new mechanism to combat pulsing Denial-of-Service (DoS) at-tacks. Pulsing DoS attacks can seriously degrade the throughput of legitimate TCP flows in a stealthy manner. The attacker send periodic short bursts of traffic (i.e. pulses) to cause packet losses of TCP flows. For improving robustness of TCP against the attacks, we propose to use adaptive bandwidth estimation mechanism in TCP congestion control process. The performance of the proposed method is evaluated through simulations, and is compared with the other TCP variants. From the simulation results, we verified that the proposed method can effectively mitigate the effect of pulsing DoS attacks
Abstract-- We propose using spectral analysis to identify normal TCP traffic so that it will not be ...
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks whi...
Abstract- Over the last few years the Internet has seen a continuous rise of malicious traffic. Thes...
In this paper we analyze a new class of pulsing denial-of-service (PDoS) attacks that could seriousl...
xviii, 219 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2007 LuoThis thesis pres...
Congestion control algorithms in TCP are designed for a co-operative environment with the assumption...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment w...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting...
Abstract—We propose a new stealthy DDoS attack model referred to as the ”quiet ” attack. The attack ...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
Distributed Denial-of-Service (DDoS) is a big threat to the availability of Internet-based services ...
Abstract—We consider the problem of overcoming (distributed) denial-of-service (DoS) attacks by real...
Abstract A few low-rate, TCP-targeted Denial-of-Service (DoS) attacks have been recently proposed, ...
Abstract-- We propose using spectral analysis to identify normal TCP traffic so that it will not be ...
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks whi...
Abstract- Over the last few years the Internet has seen a continuous rise of malicious traffic. Thes...
In this paper we analyze a new class of pulsing denial-of-service (PDoS) attacks that could seriousl...
xviii, 219 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2007 LuoThis thesis pres...
Congestion control algorithms in TCP are designed for a co-operative environment with the assumption...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment w...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting...
Abstract—We propose a new stealthy DDoS attack model referred to as the ”quiet ” attack. The attack ...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
Distributed Denial-of-Service (DDoS) is a big threat to the availability of Internet-based services ...
Abstract—We consider the problem of overcoming (distributed) denial-of-service (DoS) attacks by real...
Abstract A few low-rate, TCP-targeted Denial-of-Service (DoS) attacks have been recently proposed, ...
Abstract-- We propose using spectral analysis to identify normal TCP traffic so that it will not be ...
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks whi...
Abstract- Over the last few years the Internet has seen a continuous rise of malicious traffic. Thes...