2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277)
DOI: 10.1109/milcom.2001.985767
|View full text |Cite
|
Sign up to set email alerts
|

Assessing and quantifying denial of service attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…For the failures-prone scenario, we aimed to investigate how well various task admission and selection strategies would perform in the face of large failures, such as distributed denial of service attacks and power outages, which cause entire provider sites to fail. We selected such scenarios because power outages and denial of service attacks are increasing threats [20,21]. For the failures-prone scenario, we repeated the conditions of the heterogeneous scenario but introduced the possibility that providers could fail and then recover.…”
Section: Experiments Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…For the failures-prone scenario, we aimed to investigate how well various task admission and selection strategies would perform in the face of large failures, such as distributed denial of service attacks and power outages, which cause entire provider sites to fail. We selected such scenarios because power outages and denial of service attacks are increasing threats [20,21]. For the failures-prone scenario, we repeated the conditions of the heterogeneous scenario but introduced the possibility that providers could fail and then recover.…”
Section: Experiments Scenariosmentioning
confidence: 99%
“…Fourth, we investigate market robustness in the face of sudden, temporary failures among providers. Such failures may arise in computation marketplaces due to problems in the power distribution grid [20] or to attacks on selected provider sites [21].…”
Section: Introductionmentioning
confidence: 99%
“…DoS may occur due to high demand of authentic users (e.g., congestion and flash crowd) or an unmalicious fault (e.g., network outage) or it may occur due to malicious actions carried out by unauthentic users on the network, which is a DoS attack (e.g., SYN flooding) [1]. DoS attacks can be executed in two ways.…”
Section: Introductionmentioning
confidence: 99%