1,594 resources related to Denial-of-service Attack
- Topics related to Denial-of-service Attack
- IEEE Organizations related to Denial-of-service Attack
- Conferences related to Denial-of-service Attack
- Periodicals related to Denial-of-service Attack
- Most published Xplore authors for Denial-of-service Attack
ICC 2020 - 2020 IEEE International Conference on Communications
All topics relating to existing and emerging communications networking technologies.
IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.
IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
The CDC is the premier conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, automatic control, and related areas.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...
Specific topics of interest include, but are not limited to, sequence analysis, comparison and alignment methods; motif, gene and signal recognition; molecular evolution; phylogenetics and phylogenomics; determination or prediction of the structure of RNA and Protein in two and three dimensions; DNA twisting and folding; gene expression and gene regulatory networks; deduction of metabolic pathways; micro-array design and analysis; proteomics; ...
2017 1st International Conference on Intelligent Systems and Information Management (ICISIM), 2017
Use of online applications in day-to-day life is increasing. In parallel to this increase the threat to the security of these applications is also increasing. The security of these applications is breached by different cyber attacks. Denial-of-Service (DoS) is one such type of cyber attack. DoS makes the online application or the resources of the server unavailable to the intended ...
16th International Conference on Advanced Communication Technology, 2014
The Android's message passing system provides late run-time binding between components in the same or different applications, and it promotes inter- application collaboration. However, the message passing mechanism has also numerous vulnerabilities, so that Android applications can be exposed to attacks from malicious applications. Denial of service (DoS) attack on ordered broadcasts is a typical attack that exploits vulnerabilities of ...
2014 International Conference on Recent Trends in Information Technology, 2014
Denial of service attack in computing involves blocking of resources to particular user. This kind of blocking may be temporary or indefinite blocking to access web server in the network. This attack is usually done by a victim web server. Distributed denial of service attacks is given by more than two web servers. The flood of incoming network flows to ...
2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2017
Wireless Environments are the most successful communication and data service providing medium now-a-days. Security and Trustworthiness are the two major strategies users' needs to be concern with. Denial of Service attack is the major threat that occurs while communicating data from one end to other end. The main aim of the Denial of service attack is the disruption of services ...
2016 4th International Conference on Cyber and IT Service Management, 2016
The usage of near field communication (NFC)-enabled mobile phone devices increased in several sectors such as identification, connected home, payment, and business. Moreover, the implementation of NFC in many field which is closely related to personal data of consumers or users. Therefore, security issues in NFC-enabled mobile phone devices has become one of challenging for utilizing this technology in consumer ...
2019 ICRA Keynote- Mocap as a Service
Joe Klein: IoT Security - Industry Forum Panel: WF IoT 2016
IMS 2010 Special Features: Recognizing Chuck Swift's 52 Years of Service
Teacher In-Service Workshop
Shao-Chuan Lee: SandUSB: An Installation-Free Sandbox for USB Peripherals: WF-IoT 2016
IEEE, IEEE-HKN and Public Service
David G. Green - IEEE Haraden Pratt Award, 2019 IEEE Honors Ceremony
Zipline - IEEE Spectrum Technology in the Service of Society Award - 2019 IEEE Honors Ceremony
Knowledge as a Service Plaform for COVID19 | DSBC 2020
Networking in the Cloud Computing Era
Lew Tucker, IEEE GLOBECOM'13 Keynote Address - Lew Tucker, CTO, Cisco Systems
2015 IEEE Honors: IEEE Spectrum Technology in the Service of Society Award
Indian Institute of Technology Madras accepts the Spectrum Technology in the Service of Society Award - Honors Ceremony 2017
Honors 2020: Mary Ellen Randall Wins the IEEE Haraden Pratt Award
Detecting a GPS Spoof from a Superyacht
Nicholas J. Kirsch: Service Learning in EPICS in IEEE - Studio Tech Talks: Sections Congress 2017
Sean Sliger of Neuropace accepts the IEEE Spectrum Technology in the Service of Society Award - Honors Ceremony 2016
Honors 2020: Philips Wins the IEEE Spectrum Technology in the Service of Society Award
Stephen Weinstein accepts the IEEE Richard M. Emberson Award - Honors Ceremony 2016
Use of online applications in day-to-day life is increasing. In parallel to this increase the threat to the security of these applications is also increasing. The security of these applications is breached by different cyber attacks. Denial-of-Service (DoS) is one such type of cyber attack. DoS makes the online application or the resources of the server unavailable to the intended users. For detecting these DoS attacks a detection system is proposed which can be used for detecting both known and unknown attacks. In the proposed system makes use of multivariate correlation analysis (MCA) technique which extracts the geometrical correlation between network traffic. This geometrical correlation is used for detecting DoS attack. Triangle area based technique to used enhance and speedup the MCA process. KDD cup 99 dataset is for examining the effectiveness of the proposed system. To increase the detection rate and to reduce the complexity of the proposed system a subset of features of the record is used. This subset is used in the whole detection process.
The Android's message passing system provides late run-time binding between components in the same or different applications, and it promotes inter- application collaboration. However, the message passing mechanism has also numerous vulnerabilities, so that Android applications can be exposed to attacks from malicious applications. Denial of service (DoS) attack on ordered broadcasts is a typical attack that exploits vulnerabilities of message passing. A malicious application which launches the attack intercepts broadcast messages by setting itself high priority, and then aborts it to prevent other benign applications from receiving it. In this paper, we propose a security framework for detecting DoS attacks on ordered broadcasts. We insert our framework into Android platform, and then the framework inspects receivers of broadcast messages. If the framework detects any threats, it issues warning to user. Finally, we provides scenario about our framework and discuss future directions.
Denial of service attack in computing involves blocking of resources to particular user. This kind of blocking may be temporary or indefinite blocking to access web server in the network. This attack is usually done by a victim web server. Distributed denial of service attacks is given by more than two web servers. The flood of incoming network flows to the victim web server forces it to shut down. Although the attack's individual internet packets may be completely not dangerous and flood of such type of packets can overwhelm the victim server's internet connection or other packet-processing resources in the network. The result is that valid traffic, unable to compete with malicious flood, has little chance for obtaining useful service to legitimate users. This paper mainly concentrates on flow and rank correlation based algorithm (FRCD). With rank correlation we can check if there is any attack in the network or not. And having this as the base we could calculate flow correlation to check if this attack is legitimate or not. The proposed system is highly efficient and is a protocol independent method. The computational cost involved does not affect the network's throughput thereby increasing the possibilities of Distributed Reflection Denial of Service attack detection.
Wireless Environments are the most successful communication and data service providing medium now-a-days. Security and Trustworthiness are the two major strategies users' needs to be concern with. Denial of Service attack is the major threat that occurs while communicating data from one end to other end. The main aim of the Denial of service attack is the disruption of services by attempting to limit access to a machine or any service. For eliminating this new approach called Artificial Bee Reverse Tracing (ABRT) is introduced. Along with this, a data security scheme is proposed to secure the data and maintain its integrity over wireless medium by using Reverse Tracing Technique (RTT).
The usage of near field communication (NFC)-enabled mobile phone devices increased in several sectors such as identification, connected home, payment, and business. Moreover, the implementation of NFC in many field which is closely related to personal data of consumers or users. Therefore, security issues in NFC-enabled mobile phone devices has become one of challenging for utilizing this technology in consumer privacy concerns. In this research, the author analyze and conducted security testing on NFC-enabled mobile phones based on reader/writer operating mode in peer-to-peer fashion manner to find a few vulnerabilities. The author use Denial-of-Service attack methods for the attacking NFC-enabled mobile phones through NDEF messages by two semantic levels of Distributed Denial-of-Service attack techniques, first is Attacking an application technique used to make a NFC-enabled mobile phones browser could not handle when the opening a single URL which contain infinite loop, for a moment the browser opened one hundred page more and appear dialog box “browser isn't responding”. Second is exploiting vulnerability in NFC-enabled mobile phones, the author develop a simple app.apk which set appname 500000+ chars in strings.xml file. This app give some serious impact the NFC-enabled mobile phones, where the smartphones for a few moment could not respond any interaction from user and after several times the smartphone can respond slowly some interactions from the user, crash and rebooting automatically. The proof of concepts have been conducted on three NFC-enabled mobile phones.
Mobile Ad-Hoc Network (MANET) is network of wireless communication, dynamic topology, limited resources and lack of centralized administration. MANETs are vulnerable to various types of Denial of Service attack on network layer. In Gray hole and Black hole attacks malicious nodes deliberately disturb data transmission in the network by sending incorrect routing information. It is a challenge to keep the communication route free from such attackers. In this paper, the comparative study of various techniques against Denial of Service attack is made.
A distributed denial of service attack (DDoS) is adopted to hackers often attack means. The paper introduces the denial of service attack types, introduces DDoS attack the principle and the steps, Combined with the more common Syn Flood Attack principle, The actual defenses and DDoS.
Software Defined Network (SDN), a very new idea in networking domain, promises to dramatically simplify network management and enable innovation through network programmability. In spite of significant benefits, this emerging architecture suffers from several security challenges which make it vulnerable to different attacks like denial of service attack, man-in-middle attack etc. In this paper, we have discussed about the impact of denial of service attack on SDN environment and several existing solutions to defend it. Finally we have given a new proposal for detecting denial of service attack in SDN environment.
Low-rate denial-of-service Attack takes effect by exploiting the vulnerability of the adaptive behaviours exhibited by network protocols.lt aims at substantially decreasing the throughput of victims by sending periodical low- rate pulse,which affects TCP flows to back off and enter the retransmission timeout state.lt is hard to identify or defend due to its low-rated character. The paper analyzes the principles of attack and the deficiency of existing methods.We extract two basic signatures of LDoS Attack and propose a mechanism to detect and filter the malicious flow.Our experiments indicate that this mechanism can effictively detect the malicious flow in simulation.lt can reduce false positives of LDoS Attack detection schemes and increase the throughput of the routers.
The distributed denial of service attack is a major threat to current internet security. One of the most threatening type is flooding based DDoS attack. In this paper we have proposed a defense mechanism for flooding based DDoS attack based on the concept of rate limiting the attack traffic The propose defense framework consist of three major components, detection, IP traceback and bandwidth control component. The proposed defense system is a distributed mechanism because it is deployed on all edge routers of the network. Our defense algorithm that is bandwidth control algorithm mainly tries to keep the server load within the maximum and minimum server load limits. The bandwidth control component at the victim end set up rate limits according to server load and source end traffic rate with the help of bandwidth control component at source end. The proposed rate limiting scheme will penalize the different attackers based on their rate limits and server load. The rate limit value for each attacker router is calculated dynamically. The victim end defense system decrease the rate limit exponentially and increase it linearly based on the attack traffic rate.
No standards are currently tagged "Denial-of-service Attack"