In this paper we experimentally analyse various dynamic timeout adjustment strategies in server queues as poten-tial counter-measures against degradation of service attacks. Previous theoretical work studied the relative performance of both coarse-grained threshold-based timeout and fine-grained adjusment strategies where the timeout value is as the number of connections in the queue varies. In addi-tion, two methods for removing timed-out connections were explored: the deterministic method where the expiry time is determined at connection arrival depending on the time-out value at that moment, and the deferred method where connections are continuously polled and flushed when the time-in-queue is larger than the current timeout value. We re...
We present an empirical study of the resistance of several protocols to denial of service (DoS) atta...
A Delay/Disruption Tolerant Network (DTN) is an overlay on top of a number of diverse networks such ...
Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targete...
In this paper we experimentally analyse various dynamic timeout adjustment strategies in server queu...
Abstract. In this paper, we study the performance of timeout-based queue management practices in the...
Due to the widely deployed wide-area computer and communications networks; the Internet has undergon...
In a previous paper [1], we proposed and analyzed a timeout scheme to alleviate network congestion a...
Many network-based applications commonly open some known port(s) to communicate with their users, th...
Denial of Service (DOS) attacks are a major threat faced by all types of networks. The effect of DOS...
In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's...
A weak point in network-based applications is that they commonly open some known communication port(...
We expose an unorthodox adversarial attack that exploits the transients of a system’s adaptive behav...
A Delay/Disruption Tolerant Network (DTN) is an overlay on top of a number of diverse networks such ...
With the rapid growth of security threats in computer networks, the need for developing efficient se...
The 6L0WPAN adaptation layer is widely used in many Internet of Things (IoT) and vehicular networkin...
We present an empirical study of the resistance of several protocols to denial of service (DoS) atta...
A Delay/Disruption Tolerant Network (DTN) is an overlay on top of a number of diverse networks such ...
Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targete...
In this paper we experimentally analyse various dynamic timeout adjustment strategies in server queu...
Abstract. In this paper, we study the performance of timeout-based queue management practices in the...
Due to the widely deployed wide-area computer and communications networks; the Internet has undergon...
In a previous paper [1], we proposed and analyzed a timeout scheme to alleviate network congestion a...
Many network-based applications commonly open some known port(s) to communicate with their users, th...
Denial of Service (DOS) attacks are a major threat faced by all types of networks. The effect of DOS...
In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's...
A weak point in network-based applications is that they commonly open some known communication port(...
We expose an unorthodox adversarial attack that exploits the transients of a system’s adaptive behav...
A Delay/Disruption Tolerant Network (DTN) is an overlay on top of a number of diverse networks such ...
With the rapid growth of security threats in computer networks, the need for developing efficient se...
The 6L0WPAN adaptation layer is widely used in many Internet of Things (IoT) and vehicular networkin...
We present an empirical study of the resistance of several protocols to denial of service (DoS) atta...
A Delay/Disruption Tolerant Network (DTN) is an overlay on top of a number of diverse networks such ...
Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targete...