Survey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract: Distributed denial-of-service (DDoS) attacks are one of the key threats and perhaps the toughest security problem for today’s Internet.Distributed Denial of Service (DDoS) attack has become a stimulating problem to the availability of resources in computer networks.With brief or no advance warning, a DDoS attackcan easily drain the computing and communication resources of its victim within a short period of time. In this paper, DDoS attacks based on the protocols vulnerabilities in the TCP/IP model, their impact on available resources viz CPU,memory,buffer space is investigated. This paper aims to provide a better understanding of the existing tools,methods and comparative analysis of them,and defense mechanisms
Authors and Affiliations
Saket Acharya , Namita Tiwari
Efficient Techniques for Unauthorized Attacks with Time-Stamp
Abstract: In many applications it is very useful to identify the unexpected activities on data with respect totime. Cyber security is one of the application area in which we are using intrusion detection system to...
Energy Consumption of Intermediate node in AODV
Abstract: An A MANET(Mobile Ad-Hoc NETwork)is a network of wireless mobile nodes,without a centralizedcontrol.MANET can be characterized as unstructured Ad-Hoc,mobile nodes with limited resources includingenergy.AO...
Management Support System (Mss) In Higher Educational Institutions (Heis): University Of Jos, Nigeria. Ict Support
Abstract: Management support system is of great importance in the institutions of higher learning, as an interactive computer-base system that support cooperate memory or knowledge base that constitutes the problem-solvi...
Implementation of Various Cryptosystem Using Chaos
Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic a...
A Secure Data Transmission by Embedding Marked Encrypted Image on Cloak Image
Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each no...