2009 12th International Conference on Computers and Information Technology 2009
DOI: 10.1109/iccit.2009.5407310
|View full text |Cite
|
Sign up to set email alerts
|

Steps to defend against DoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Among the most common DoS attacks there are flooding attacks which exploit holes in used network protocols [5]. In our work we focus on proposal of modification of SYN flood attack detection mechanism and its implementation into KaTaLyzer.…”
Section: Introductionmentioning
confidence: 99%
“…Among the most common DoS attacks there are flooding attacks which exploit holes in used network protocols [5]. In our work we focus on proposal of modification of SYN flood attack detection mechanism and its implementation into KaTaLyzer.…”
Section: Introductionmentioning
confidence: 99%
“…Spam is used by bots to overload the email inboxes and increase the traffic on a server which eventually leads to DoS. A number of approaches have been taken in order to defend against DoS attacks [4]. Around 80% of the received emails today are spam.…”
Section: Introductionmentioning
confidence: 99%