Browser-Based DDoS Attacks without Javascript
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 12
Abstract
Recently, browser-based distributed denial of service (DDoS) attacks, in which a malicious JavaScript program is distributed through an advertisement network, and runs in the background of the web browser, were observed. In this paper, we address a question whether browser-based DDoS attacks can be realized without JavaScript. We construct new browser-based DDoS attacks based only on HTML functions, and compare them with the existing JavaScript-based DDoS attacks in efficiency.
Authors and Affiliations
Ryo Kamikubo, Taiichi Saito
FPGA based Synthesize of PSO Algorithm and its Area-Performance Analysis
Digital filters are the most significant part of signal processing that are used in enormous applications such as speech recognition, acoustic, adaptive equalization, and noise and interference reduction. It would be of...
A Comparative Study of Engineering Students Pedagogical Progress
Students’ pedagogical progress plays a pivotal role in any educational institute in order to pursue imperative education. Educational institutes, Universities, Colleges implement various performance measures in order to...
An Improved Squaring Circuit for Binary Numbers
In this paper, a high speed squaring circuit for binary numbers is proposed. High speed Vedic multiplier is used for design of the proposed squaring circuit. The key to our success is that only one Vedic multiplier is us...
Context Aware Fuel Monitoring System for Cellular Sites
The past decade has been very productive for cellular operators of Pakistan, as their subscribers have grown exponentially with increase in revenue. After this wave of rising, the operators have now reached to saturation...
Requirements Prioritization and using Iteration Model for Successful Implementation of Requirements
Requirements prioritization is ranking of software requirements in particular order. Prioritize requirements are easy to manage and implement while un-prioritized requirements are costly and consume much time as total es...