Among various types of denial of service attacks, “dropping attack ” is probably the most difficult one to handle. This paper explores the negative impacts of packet dropping attacks and a method to detect such attacks. First, three dropping patterns are classified and investigated. We demonstrate that attackers can choose different dropping patterns to degrade TCP service to different levels, and selectively dropping a very small number of packets can result in a severe damage to TCP performance. Second, we show that a hacker can utilize a DDoS attack tool to control a “uncompromised ” router to emulate dropping attacks. This proves that dropping attacks are indeed practically very possible to happen in today’s Internet environment. Third,...
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechani...
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting...
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
Abstract A few low-rate, TCP-targeted Denial-of-Service (DoS) attacks have been recently proposed, ...
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, su...
In this paper we analyze a new class of pulsing denial-of-service (PDoS) attacks that could seriousl...
Opportunistic networks (OppNets) are an interesting topic that are seen to have a promising future. ...
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. M...
Ad hoc networking has received considerable attention in the research community for seamless communi...
xviii, 219 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2007 LuoThis thesis pres...
The TCP has provided the primary means to transfer data reliably across the Internet however TCP has...
Security is a major challenge in Opportunistic Networks (OppNets) due to its characteristics o...
Abstract—We propose a new stealthy DDoS attack model referred to as the ”quiet ” attack. The attack ...
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechani...
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting...
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...
The Internet is not a safe place. Unsecured hosts can expect to be compromised within minutes of con...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
Abstract A few low-rate, TCP-targeted Denial-of-Service (DoS) attacks have been recently proposed, ...
Security is a major challenge in Opportunistic Networks (OppNets) because of its characteristics, su...
In this paper we analyze a new class of pulsing denial-of-service (PDoS) attacks that could seriousl...
Opportunistic networks (OppNets) are an interesting topic that are seen to have a promising future. ...
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. M...
Ad hoc networking has received considerable attention in the research community for seamless communi...
xviii, 219 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2007 LuoThis thesis pres...
The TCP has provided the primary means to transfer data reliably across the Internet however TCP has...
Security is a major challenge in Opportunistic Networks (OppNets) due to its characteristics o...
Abstract—We propose a new stealthy DDoS attack model referred to as the ”quiet ” attack. The attack ...
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechani...
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting...
We consider the problem of detecting whether a compromised router is maliciously manipulating its st...