2008 IEEE International Conference on Networking, Sensing and Control 2008
DOI: 10.1109/icnsc.2008.4525506
|View full text |Cite
|
Sign up to set email alerts
|

Research on DoS Atomic Attack Oriented to Attack Resistance Test

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…DoS attack methods are generally divided into vulnerability attacks and flooding attacks [1], [3], [4]. Vulnerability attacks exploit any weaknesses in the target server that have resulted from design errors or ambiguities.…”
Section: C: Attack Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…DoS attack methods are generally divided into vulnerability attacks and flooding attacks [1], [3], [4]. Vulnerability attacks exploit any weaknesses in the target server that have resulted from design errors or ambiguities.…”
Section: C: Attack Methodsmentioning
confidence: 99%
“…Both the previous methods supply multiple attackers with the same provision because the F5 attacker's behaviors are limited by the I/O devices, leading to the same and constant attack rate. However, unlike F5 attackers, attackers who launch DoS tool attacks apply different attack rates [17], [27] and, in addition, can adjust the attack rate to match different targeted error rates while monitoring the current server status [4], [13]. This makes it difficult for the methods proposed in our previous studies to deceive DoS tool attackers into believing their attacks are successful.…”
Section: Problemmentioning
confidence: 98%
See 3 more Smart Citations