Browser-Based DDoS Attacks without Javascript
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 12
Abstract
Recently, browser-based distributed denial of service (DDoS) attacks, in which a malicious JavaScript program is distributed through an advertisement network, and runs in the background of the web browser, were observed. In this paper, we address a question whether browser-based DDoS attacks can be realized without JavaScript. We construct new browser-based DDoS attacks based only on HTML functions, and compare them with the existing JavaScript-based DDoS attacks in efficiency.
Authors and Affiliations
Ryo Kamikubo, Taiichi Saito
A Feature Selection Algorithm based on Mutual Information using Local Non-uniformity Correction Estimator
Feature subset selection is an effective approach used to select a compact subset of features from the original set. This approach is used to remove irrelevant and redundant features from datasets. In this paper, a novel...
Experimental Use of Kit-Build Concept Map System to Support Reading Comprehension of EFL in Comparing with Selective Underlining Strategy
In this paper, we describe the effects of using Kit-Build concept mapping (KB-mapping) method as a technology-enhanced support for the Reading Comprehension (RC) in English as Foreign Language (EFL) contexts. RC is a pro...
Urdu Word Segmentation using Machine Learning Approaches
Word Segmentation is considered a basic NLP task and in diverse NLP areas, it plays a significant role. The main areas which can be benefited from Word segmentation are IR, POS, NER, sentiment analysis, etc. Urdu Word Se...
Network Traffic Classification using Machine Learning Techniques over Software Defined Networks
Nowadays Internet does not provide an exchange of information between applications and networks, which may results in poor application performance. Concepts such as application-aware networking or network-aware applicati...
Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect
The prolific growth of network communication system entails high risk of breach in information security. This substantiates the need for higher security for electronic information. Cryptography is one of the ways to secu...