Searched for: +
(1 - 14 of 14)
document
Anghel, R.I. (author), Zhauniarovich, Y. (author), Hernandez Ganan, C. (author)
Distributed Denial-of-Service (DDoS) attacks continue to threaten the availability of Internet-based services. While countermeasures exist to decrease the impact of these attacks, not all operators have the resources or knowledge to deploy them. Alternatively, anti-DDoS services such as DDoS clearing houses and blackholing have emerged....
journal article 2024
document
Oortwijn, Joost (author)
The rapid growth of internet-connected devices has led to a significant increase in the number of cyber attacks, resulting in security challenges related to IoT. Researchers have discovered a new attack technique that can be used for launching large DDoS attacks, which involves TCP reflective amplification by abusing middleboxes and IoT devices....
master thesis 2023
document
Broy, Frank (author)
DDoS attacks are becoming more common and sophisticated. Only recently, in 2017, Google claims they have mitigated an attack which sent 2.54 Tbps of traffic to their servers. In order to prevent these attacks, more and more robust defence mechanisms need to be put in place to withstand the malicious traffic and secure the networks. Programmable...
bachelor thesis 2022
document
Lone, Q.B. (author)
IP spoofing is the act of forging source IP addresses assigned to a host machine. Spoofing provides users the ability to hide their identity and impersonate another machine. Malicious users use spoofing to invoke a variety of attacks. Examples are Distributed Denial of Service (DDoS) attacks, policy evasion and a range of application-level...
doctoral thesis 2022
document
Mohammadi, Reza (author), Lal, C. (author), Conti, M. (author)
Nowadays, the number of Distributed Denial of Service (DDoS) attacks is growing rapidly. The aim of these type of attacks is to make the prominent and critical services unavailable for legitimate users. HTTP flooding is one of the most common DDoS attacks and because of its implementation in application layer, it is difficult to detect and...
journal article 2022
document
Sommese, Raffaele (author), Jonker, Mattijs (author), van der Ham, Jeroen (author), Moura, Giovane C. M. (author)
Electronic government (e-gov) enables citizens and residents to digitally interact with their government via the Internet. Underpinning these services is the Internet Domain Name Systems (DNS), which maps e-gov domain names to Internet addresses. Structuring DNS with multiple levels of redundancy that can withstand stress events such as denial...
conference paper 2022
document
Dikmen, Cemal (author)
With the growing scale of the IoT, many industries enjoy the benefit of automation. The IoT consists of an interconnected network of devices that sense their surroundings and share data among other IoT devices. However, this data can be sensitive and private in nature, making security within the ever-growing IoT network a high priority. Because...
bachelor thesis 2021
document
Su, Kevin (author)
To protect critical services in today's society it is necessary to mitigate and prevent risks threatening the reliability of the internet. Internet-of-Things (IoT) devices are the number one attack target on the internet. The situation will become worse as there will be an expected 40 billion IoT devices in 2025. IoT bot activity represented 78%...
master thesis 2021
document
Griffioen, H.J. (author), Oosthoek, K. (author), van der Knaap, Paul (author), Dörr, C. (author)
Amplification attacks generate an enormous flood of unwanted traffic towards a victim and are generated with the help of open, unsecured services, to which an adversary sends spoofed service requests that trigger large answer volumes to a victim. However, the actual execution of the packet flood is only one of the activities necessary for a...
conference paper 2021
document
Wagner, Daniel (author), Kopp, Daniel (author), Wichtlhuber, Matthias (author), DIetzel, Christoph (author), Hohlfeld, Oliver (author), Smaragdakis, G. (author), Feldmann, Anja (author)
Amplification Distributed Denial of Service (DDoS) attacks' traffic and harm are at an all-time high. To defend against such attacks, distributed attack mitigation platforms, such as traffic scrubbing centers that operate in peering locations, e.g., Internet Exchange Points (IXP), have been deployed in the Internet over the years. These...
conference paper 2021
document
Noroozian, A. (author)
Hosting providers are theoretically in a key position to combat cybercrime as they are often the entities renting out the resources that end up being abused by miscreants. Yet, notwithstanding hosting providers' current security measures to combat abuse, their responses vary widely. In many cases the response is ineffective, as empirical...
doctoral thesis 2020
document
Sasaki, Takayuki (author), Hernandez Ganan, C. (author), Yoshioka, Katsunari (author), van Eeten, M.J.G. (author), Matsumoto, Tsutomu (author)
Distributed Denial of Service attacks against the application layer (L7 DDoS) are among the most difficult attacks to defend against because they mimic normal user behavior. Some mitigation techniques against L7 DDoS, e.g., IP blacklisting and load balancing using a content delivery network, have been proposed; unfortunately, these are...
journal article 2020
document
Serracino Inglott, P. (author)
Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition...
journal article 2013
document
Maregeli, C.N. (author)
Over the years, the Internet has evolved from a tool for the research community to an indispensable network connecting over a billion nodes world wide. There are many security threats existing on the Internet, one of them is the denial-of-service attack (DoS). In this thesis, we study effect of denial-of-service attacks arising from TCP SYN...
master thesis 2010
Searched for: +
(1 - 14 of 14)