Welcome![Sign In][Sign Up]
Location:
Search - dos attacks

Search list

[Communicationdnsguardpro

Description: dnsguard是一种高性能DoS攻击检测和防护工具。它可以监听以太网上的ip协议数据流,分析其中是否有DoS攻击,当发现了DoS攻击,dnsguard会自动向F5交换机发出指令,删除该攻击者的连接,并在一段时间内禁止其访问。dnsguard有效的防止了DoS攻击对服务器造成的危害,保证服务器的正常运作。-dnsguard is a high-performance DoS attack detection and prevention tools. It can monitor ip on the Ethernet protocol data flow analysis of whether DoS attacks, When it is discovered that the DoS attacks, dnsguard automatically switches to F5 issued a directive deletion of the attacker connectivity, and over a period of time against his visit. Dnsguard effective prevention of DoS attacks on the harm caused servers to ensure the normal operation of the server.
Platform: | Size: 7894 | Author: 郭春山 | Hits:

[OtherDOSgongji

Description: 计算机专业本科毕业论文,DOS攻击方式的研究及实现,仅供参考!-computer Undergraduate Thesis, DOS attacks and the way to achieve that is for reference only.
Platform: | Size: 40735 | Author: 冉澄 | Hits:

[Develop ToolsIPfgzrar

Description: IP反向追踪技术综述 拒绝服务攻击(DoS)给政府部门和商业机构造成了严重的经济损失和社会威胁。IP追踪技术能够反向追踪IP数据包到它 们的源头,所以是识别和阻止DoS攻击的重要一步。本文针对DoS攻击,对比分析了各个IP反向追踪方法的基本原理和优缺点。 关键词 DoS攻击 主动追踪 反应追踪-IP traceback Technology denial of service attacks (DoS) to government departments and commercial organizations have caused serious The economic losses and social threats. IP tracking technology to backtracking IP data packets to their source, So it is to identify and stop DoS attacks important step forward. This paper DoS attacks, comparison and analysis of the various IP traceback method of the basic tenets of advantages and disadvantages. Keywords DoS attack response tracking initiative tracking
Platform: | Size: 38825 | Author: air | Hits:

[Program docdnsguardpro

Description: dnsguard是一种高性能DoS攻击检测和防护工具。它可以监听以太网上的ip协议数据流,分析其中是否有DoS攻击,当发现了DoS攻击,dnsguard会自动向F5交换机发出指令,删除该攻击者的连接,并在一段时间内禁止其访问。dnsguard有效的防止了DoS攻击对服务器造成的危害,保证服务器的正常运作。-dnsguard is a high-performance DoS attack detection and prevention tools. It can monitor ip on the Ethernet protocol data flow analysis of whether DoS attacks, When it is discovered that the DoS attacks, dnsguard automatically switches to F5 issued a directive deletion of the attacker connectivity, and over a period of time against his visit. Dnsguard effective prevention of DoS attacks on the harm caused servers to ensure the normal operation of the server.
Platform: | Size: 7168 | Author: 郭春山 | Hits:

[OtherDOSgongji

Description: 计算机专业本科毕业论文,DOS攻击方式的研究及实现,仅供参考!-computer Undergraduate Thesis, DOS attacks and the way to achieve that is for reference only.
Platform: | Size: 40960 | Author: 冉澄 | Hits:

[BooksIPfgzrar

Description: IP反向追踪技术综述 拒绝服务攻击(DoS)给政府部门和商业机构造成了严重的经济损失和社会威胁。IP追踪技术能够反向追踪IP数据包到它 们的源头,所以是识别和阻止DoS攻击的重要一步。本文针对DoS攻击,对比分析了各个IP反向追踪方法的基本原理和优缺点。 关键词 DoS攻击 主动追踪 反应追踪-IP traceback Technology denial of service attacks (DoS) to government departments and commercial organizations have caused serious The economic losses and social threats. IP tracking technology to backtracking IP data packets to their source, So it is to identify and stop DoS attacks important step forward. This paper DoS attacks, comparison and analysis of the various IP traceback method of the basic tenets of advantages and disadvantages. Keywords DoS attack response tracking initiative tracking
Platform: | Size: 38912 | Author: air | Hits:

[Linux-Unixmultithread_dos_attak_sourcecode

Description: 多线程dos攻击程序源代码,希望对大家有所帮助-multithreading dos attacks source code, we hope to help
Platform: | Size: 18432 | Author: 曲晶莹 | Hits:

[Internet-NetworkDGOD

Description: 用汇编语言写的DOS拒绝攻击源代码程序。-Written using assembly language source code for DOS attacks refuse procedures.
Platform: | Size: 6144 | Author: 树小熊 | Hits:

[Internet-NetworkDoS

Description: DOS攻击原理介绍。,利用syn洪水技术,使用原始套接字的伪造源地址技术-Introduce the principle of DOS attacks. The use of syn floods technology, the use of raw socket forged source address technical
Platform: | Size: 12288 | Author: 尤好 | Hits:

[Process-Threadduoxianchengdos

Description: 多线程dos攻击程序, 这个代码!~ 我们可以理解到如果利用线程做高效率的事情!还有 如果编写更底层的网络程序!例如如何自己填充数据包发送!-Dos attacks on multi-threaded program, the code! ~ We can understand that if an efficient use of threads to do things! Are prepared if the underlying network procedures more! Such as how to fill their own packets to send!
Platform: | Size: 18432 | Author: 张希行 | Hits:

[Internet-NetworkDOSattacke

Description: LINUX下常见的DOS攻击源码,里面有详细的说明,希望大家共同进步!-LINUX under the common-source DOS attacks, which is described in detail, I hope that progress can be shared!
Platform: | Size: 8192 | Author: 小孔 | Hits:

[Technology ManagementDoSattacks

Description: 简要介绍七种 DoS 攻击的方法,让使用者了解攻击原理,以致于能有效防止。-DoS attacks outlined seven ways to allow users to understand the attacks on principle, so that can effectively prevent.
Platform: | Size: 1024 | Author: 王杰 | Hits:

[source in ebookdos4

Description: Since the first denial of Service (DoS) attack appears, DoS attacks cause significant financial damage every year. The majority researchers focus on detection and respond mechanism of DoS, whereas limited progress has been made in the details of DoS attacks. In this paper, we introduce Custom Audit Scripting Language (CASL) applied to write simulation program for DoS attacks. Then we take a deep research in the methodology of DoS attacks and simulate two typical DoS attacks in CASL. Additionally, recent trends of DoS attacks and problems associated with defending against DoS attacks are also discussed. In short, our simulation attack programs can help examine the nature of DoS attacks and find the corresponding countermeasures
Platform: | Size: 152576 | Author: saksss | Hits:

[Internet-NetworkDoS

Description: 利用winpcap实现的DoS攻击 C源码,会有人用得到-DoS attacks using winpcap to achieve C source code, will someone be
Platform: | Size: 3328000 | Author: 王小明 | Hits:

[OtherLow-Rate-TCP-Targeted-Denial-of-Service-Attacks-a

Description: Abstract—Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP’s congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system cooperation results in a well-known vulnerability to attack by high-rate non-responsive fl ows. In this paper, we investigate a class of low-rate denial of service attacks which, unlike high-rate attacks, are diffi cult for routers and counter-DoS mechanisms to detect. Using a combination of analytical modeling, simulations, and Internet experiments, we show that maliciously chosen low-rate DoS traffi c patterns that exploit TCP’s retransmission timeout mechanism can throttle TCP fl ows to a small fraction of their ideal rate while eluding detection. Moreover, as such attacks exploit protocol homogeneity, we study fundamental limits of the ability of a class of randomized timeout mechanisms to thwart such low-rate DoS attacks.-Abstract—Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP’s congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system cooperation results in a well-known vulnerability to attack by high-rate non-responsive fl ows. In this paper, we investigate a class of low-rate denial of service attacks which, unlike high-rate attacks, are diffi cult for routers and counter-DoS mechanisms to detect. Using a combination of analytical modeling, simulations, and Internet experiments, we show that maliciously chosen low-rate DoS traffi c patterns that exploit TCP’s retransmission timeout mechanism can throttle TCP fl ows to a small fraction of their ideal rate while eluding detection. Moreover, as such attacks exploit protocol homogeneity, we study fundamental limits of the ability of a class of randomized timeout mechanisms to thwart such low-rate DoS attacks.
Platform: | Size: 236544 | Author: van hoi | Hits:

[OS programdos

Description: DoS攻击 概念——磁盘操作系统 如何——磁盘操作系统 DOS命令行 -DoS attacks Concepts- Disk Operating System- Disk Operating System DOS command line
Platform: | Size: 19456 | Author: songyanjun | Hits:

[Industry researchdos

Description: 关于DOS攻击早年写的一些文章,给各位做无线DOS攻击一个可行的参考。-DOS attack early years to write some articles for you to do wireless DOS attacks is a viable reference.
Platform: | Size: 5120 | Author: 黄一 | Hits:

[OtherA-Prediction-Model-of-DoS-Attacks-Distribution-Di

Description: This paper describes the clustering problem first, and then utilizes the genetic algorithm to implement the optimization of clustering methods. Based on the optimized clustering on the sample data, we get various categories of the relation between traffics and attack amounts, and then builds up several prediction sub-models about DoS attack. Furthermore, according to the Bayesian method, we deduce discrete probability calculation about each sub-model and then get the distribution discrete probability prediction model for DoS attack.
Platform: | Size: 169984 | Author: ahmed | Hits:

[Linux-Unixsuite-attacks-dos-master

Description: Dos攻击软件,用于攻击测试用,出了事概不负责。。。。(Dos attack software, used for attack testing, is not responsible for the accident....)
Platform: | Size: 6144 | Author: xxxxxxs | Hits:

[3G developEnhanced traffic classification for 3G

Description: Nowadays, billions of users are connected to the internet through the 3G mobile infrastructure offering a plethora of emerging services. This explosion is associated with a heavy and complex signaling among different network elements making them vulnerable to denial of service (DoS) attacks.
Platform: | Size: 182272 | Author: hicham | Hits:
« 12 3 4 »

CodeBus www.codebus.net