xviii, 219 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2007 LuoThis thesis presents two classes of novel TCP exploits and the countermeasures. In the first exploit, we have proposed a new breed of low-rate Denial-of-Service (DoS) attacks, referred to as pulsing DoS (PDoS) attacks, which abuse TCP congestion control mechanisms to throttle a victim's throughput. Comparing with traditional flooding-based DoS attacks, PDoS attacks use much less attack traffic to cause similar damage to TCP flows. Besides TCP, the dominant transport protocol today, the emerging SCTP and DCCP will also be vulnerable to PDoS attacks. On the defense side, we have proposed two new effective schemes to detect PDoS attacks. In the second exploit, ...
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. M...
Congestion control algorithms in TCP are designed for a co-operative environment with the assumption...
AbstractA DoS attack can be regarded as an attempt of attackers to prevent legal users from gaining ...
In this paper we analyze a new class of pulsing denial-of-service (PDoS) attacks that could seriousl...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
Abstract: In this paper, we propose a new mechanism to combat pulsing Denial-of-Service (DoS) at-tac...
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks whi...
Abstract A few low-rate, TCP-targeted Denial-of-Service (DoS) attacks have been recently proposed, ...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting...
Exploiting packetspsila timing information for covert communication in the Internet has been explore...
Denial of Service (DoS) attacks pose serious threats to the Internet, exerting in tremendous impact ...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Among various types of denial of service attacks, “dropping attack ” is probably the most difficult ...
Today’s modern society greatly depends on computer systems. Security is a basic need for any compute...
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. M...
Congestion control algorithms in TCP are designed for a co-operative environment with the assumption...
AbstractA DoS attack can be regarded as an attempt of attackers to prevent legal users from gaining ...
In this paper we analyze a new class of pulsing denial-of-service (PDoS) attacks that could seriousl...
A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including ...
Abstract: In this paper, we propose a new mechanism to combat pulsing Denial-of-Service (DoS) at-tac...
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks whi...
Abstract A few low-rate, TCP-targeted Denial-of-Service (DoS) attacks have been recently proposed, ...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting...
Exploiting packetspsila timing information for covert communication in the Internet has been explore...
Denial of Service (DoS) attacks pose serious threats to the Internet, exerting in tremendous impact ...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
Among various types of denial of service attacks, “dropping attack ” is probably the most difficult ...
Today’s modern society greatly depends on computer systems. Security is a basic need for any compute...
SUMMARY Distributed denial-of-service attacks on public servers have recently become more serious. M...
Congestion control algorithms in TCP are designed for a co-operative environment with the assumption...
AbstractA DoS attack can be regarded as an attempt of attackers to prevent legal users from gaining ...