Skip to main content
In 2006, 100,000 servers were broken down just within 10 minutes . Those were the victims of some Denial-of-Service attacks. This news and knowing that some of those victims were so well-known companies like Hotmail and Amazon, indicate... more
    • by 
    •   7  
      DoS AttackCryptographyProtocolsInternet
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   4  
      Optical NetworksComputationHealthcare monitoringDenial of Service Attacks
Despite a plethora of research in the area, none of the mechanisms proposed so far for Denial-of-Service (DoS) mitigation has been widely deployed. We argue in this paper that these deployment difficulties are primarily due to economic... more
    • by 
    •   11  
      BusinessNetwork SecuritySocial WelfareVirtual Private Network
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest security problems in todayÕs Internet. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally... more
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
Cognitive radio technologies have emerged as a platform to solve the problem of spectrum scarcity for wireless applications since cognitive radios have the potential to utilize the idle licensed spectrum bands in an intelligent way... more
    • by 
    •   14  
      Competitive IntelligenceDynamic Spectrum AccessCognitive radioSystem Design
The 4-way Wi-Fi handshake is used to negotiate fresh pairwise keys, and authenticates both the client and Access Point (AP). We analyze this handshake, and discover several new denial-of-service (DoS) attacks against it. Interestingly,... more
    • by 
    •   4  
      Wi-FiNetwork Protocols802.11Denial of Service Attacks
Denial of Service attacks constitute one of the greatest problem in network security. Monitoring traffic is one of the main techniques used in order to find out the existence of possible outliers in the traffic patterns. In this paper, we... more
    • by 
    •   12  
      Network SecurityComputer NetworksNeural NetworkIntrusion Detection
We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture. It is simple, efficient, and secure; we sketch a proof of the latter property. JFK also has a number of novel... more
    • by 
    •   12  
      Information SystemsComputer ScienceDistributed Denial of Service AttackCryptography
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   6  
      Computer ScienceOptical NetworksComputationComput
Supporting hot-swappable components allows components to be replaced even while they may be in active use. This can allow live upgrades to running systems, more adaptable software that can change its behaviour at run-time by swapping... more
    • by  and +2
    •   8  
      Computer ScienceObject Oriented ProgrammingProtocolsAvailability
    • by 
    •   9  
      Distributed ComputingWireless Sensor NetworksSensor NetworkWireless Sensor
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main... more
    • by 
    •   20  
      Computer ArchitectureCancerPervasive ComputingCryptography
Denial of Service (DOS) attacks are an immense threat to lntemet sites and among the hardest security problems in today's Intemet. Of particular concernbecause of their potential impactare the Distributed Denial of Service (DDoS) attacks.... more
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
ABSTRACT Denial of Service (DoS) attacks evolved and consolidated as severe security threats to network servers, not only for Internet Service Providers but also for governments. Earlier DoS attacks involved high-bandwidth flood-based... more
    • by 
    •   3  
      Computer ScienceTaxonomyDenial of Service Attacks
Countermeasures against denial of service attacks and node misbehaviour are mandatory requirements in MANET. Essential network operations assuring basic connectivity can be heavily jeopardized by nodes that do not properly execute their... more
    • by 
    •   5  
      Mobile Ad Hoc NetworksMobile Ad Hoc NetworkRrDenial of Service Attack
Networks are prone to security attacks, and wireless infrastructure network is more vulnerable. The number of people preferring Wireless networks compared to the wired network has seen an expansion of user base owing to the fast and easy... more
    • by 
    •   3  
      WlanAccess PointDenial of Service Attacks
Countermeasures against node misbehavior and selfishness are mandatory requirements in mobile ad hoc networks. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the... more
    • by 
    •   5  
      Computer ScienceSimulationMobile Ad Hoc NetworkTheoretical Analysis
We consider the local broadcasting problem in the SINR model, which is a basic primitive for gathering initial information among n wireless nodes. Assuming that nodes can measure received power, we achieve an essentially optimal constant... more
    • by 
    •   6  
      Wireless Sensor NetworksEnergy efficiencyLower BoundEnergy Efficiency
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest security problems in todayÕs Internet. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally... more
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
Serverless distributed computing has received significant attention from both the industry and the research community. Among the most popular applications are the wide-area network file systems, exemplified by CFS, Farsite, and... more
    • by 
    •   18  
      Distributed ComputingDoS AttackDistributed SystemDistributed Systems
Recently there has been a great need to provide an adequate security level in Cloud Environments, as they are vulnerable to various attacks. Malicious behaviors such as Denial of Service attacks, especially when targeting large-scale data... more
    • by 
    •   9  
      HistoryCloud ComputingAuthenticationIEEE
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
While the DETER testbed provides a safe environment and basic tools for security experimentation, researchers face a significant challenge in assembling the testbed pieces and tools into realistic and complete experimental scenarios. In... more
    • by 
    •   12  
      DoS AttackExperimental ResearchSampling methodsAssembly
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it would be drained under normal usage. We describe three main... more
    • by 
    •   20  
      Computer ArchitectureCancerPervasive ComputingCryptography
In this paper we describe the model used for the NewsWire collaborative content delivery system. The system builds on the robustness and scalability of Astrolabe to weave a peer-to-peer infrastructure for real-time delivery of news items.... more
    • by 
    •   14  
      Computer ScienceDistributed ComputingInformation RetrievalPublishing
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   6  
      Computer ScienceOptical NetworksComputationComput
Countermeasures against node misbehavior and selfishness are mandatory requirements in mobile ad hocnetworks. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifyingthe correctness... more
    • by 
    •   4  
      Computer ScienceSimulationMobile Ad Hoc NetworkDenial of Service Attacks
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   6  
      Computer ScienceOptical NetworksComputationComput
    • by 
    •   3  
      Role Based Access ControlDenial of Service AttacksDistributed Systems Security
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical... more
    • by 
    •   3  
      Optical NetworksHealthcare monitoringDenial of Service Attacks
This paper proposes a traffic anomaly detector, operated in postmortem and in real-time, by passively monitoring packet headers of traffic. The frequent attacks on network infrastructure, using various forms of denial of service attacks,... more
    • by 
    •   9  
      Distributed ComputingTime SeriesStatistical AnalysisAnomaly Detection
Recently, several papers have studied the possibility of shrinking buffer sizes in Internet core routers to just a few dozen packets under certain constraints. If proven right, these results can open doors to building all-optical routers,... more
    • by 
    •   9  
      Computer ScienceDoS AttackDegradationThroughput
Intrusion prevention systems (IPSs) have become widely recognized as a powerful tool and an important element of IT security safeguards. Essential to every network intrusion prevention system is the ability to search through packets and... more
    • by 
    •   17  
      Computer ArchitectureComputer NetworksCryptographyDatabases