2019 Communication and Information Technologies (KIT) 2019
DOI: 10.23919/kit.2019.8883481
|View full text |Cite
|
Sign up to set email alerts
|

Network attack using TCP protocol for performing DoS and DDoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…The attacker takes advantage of the TCP three-way handshake method to establish a connection with the server [37]. In a normal scenario, the client initiates the request to exchange data with the server by sending a SYN packet.…”
Section: F Syn Flooding Attacksmentioning
confidence: 99%
“…The attacker takes advantage of the TCP three-way handshake method to establish a connection with the server [37]. In a normal scenario, the client initiates the request to exchange data with the server by sending a SYN packet.…”
Section: F Syn Flooding Attacksmentioning
confidence: 99%
“…Users can then view the report of IoT devices from desktop, android, or web-based applications [12,13] or even can make control over the device [14]. It is essential for securing data transmission in the client-server network model since there are many kinds of attacks within the network [15][16][17]. IoT developers should consider implementing SSL protocol for their system against any possible networking or cyber-attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, cyber attackers can target not only the government and big companies but also ordinary users. 2 The most used commercial communication systems and applications that can be bought without restrictions can be attacked with a high probability if they are not updated and periodically checked. Attackers can use, for example, back doors and other weaknesses like old firmware.…”
Section: Introductionmentioning
confidence: 99%
“…Attackers can use, for example, back doors and other weaknesses like old firmware. Without a massive investment in time or money, we can find many ways and schemes to attack a communication infrastructure, 3 an operating system and an application. 4 From a military point of view, coordinated cyberattacks against friendly units during operations are very dangerous.…”
Section: Introductionmentioning
confidence: 99%