Academic literature on the topic 'Amplification attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Amplification attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Amplification attack"
Anagnostopoulos, Marios, Georgios Kambourakis, Panagiotis Kopanos, Georgios Louloudakis, and Stefanos Gritzalis. "DNS amplification attack revisited." Computers & Security 39 (November 2013): 475–85. http://dx.doi.org/10.1016/j.cose.2013.10.001.
Full textQuadir, Md Abdul, J. Christy Jackson, J. Prassanna, K. Sathyarajasekaran, K. Kumar, H. Sabireen, Shivam Ubarhande, and V. Vijaya Kumar. "An efficient algorithm to detect DDoS amplification attacks." Journal of Intelligent & Fuzzy Systems 39, no. 6 (December 4, 2020): 8565–72. http://dx.doi.org/10.3233/jifs-189173.
Full textSieklik, Boris, Richard Macfarlane, and William J. Buchanan. "Evaluation of TFTP DDoS amplification attack." Computers & Security 57 (March 2016): 67–92. http://dx.doi.org/10.1016/j.cose.2015.09.006.
Full textWidagdo, Gede Barkah. "Real-Time Early Detection NTP Amplification Attack." ACMIT Proceedings 3, no. 1 (March 18, 2019): 76–84. http://dx.doi.org/10.33555/acmit.v3i1.29.
Full textNajafabadi, Maryam M., Taghi M. Khoshgoftaar, and Amri Napolitano. "Detecting Network Attacks Based on Behavioral Commonalities." International Journal of Reliability, Quality and Safety Engineering 23, no. 01 (February 2016): 1650005. http://dx.doi.org/10.1142/s0218539316500054.
Full textKhan, Muhammad Salman, Ken Ferens, and Witold Kinsner. "A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks." International Journal of Cognitive Informatics and Natural Intelligence 8, no. 3 (July 2014): 45–69. http://dx.doi.org/10.4018/ijcini.2014070104.
Full textChen, Hsien-Pu, Muneer Mohammad, and Laszlo B. Kish. "Current Injection Attack against the KLJN Secure Key Exchange." Metrology and Measurement Systems 23, no. 2 (June 1, 2016): 173–81. http://dx.doi.org/10.1515/mms-2016-0025.
Full textAlfraih Abdulaziz Nasser, A., and Wen Bo Chen. "NTP DRDoS Attack Vulnerability and Mitigation." Applied Mechanics and Materials 644-650 (September 2014): 2875–80. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2875.
Full textMalekzadeh, Mina, Moghis Ashrostaghi, and M. H. Shahrokh Abadi. "Amplification-based Attack Models for Discontinuance of Conventional Network Transmissions." International Journal of Information Engineering and Electronic Business 7, no. 6 (November 8, 2015): 15–22. http://dx.doi.org/10.5815/ijieeb.2015.06.03.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (September 14, 2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Full textDissertations / Theses on the topic "Amplification attack"
Göran, Gustafsson, and Lundberg Sebastian. "Överbelastningsattacker genom öppna reläer." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34909.
Full textThis work concerns a specific type of Denial of Service attack which is becoming increasingly popular. These attacks are carried out through open relays with the purpose of getting a significantly higher effect than otherwise achievable. Examination of attacks carried out through the services DNS and NTP have been conducted with the purpose of providing a clear picture of how serious the threat is and also clarify how a system administrator can secure the services to protect both their own and others resources. The results of our studies show that an attack performed through a DNS service gives under optimal conditions a amplification factor of "102.4" and an attack through a NTP service gives under optimal conditions a amplification factor of "229.16". The results also show that the problem can be solved in whole or in part by limiting the allowed network or disable recursion in DNS and commands in NTP.
Avanzato, Simone. "Sicurezza e DNS: test di attacco e difesa." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Find full textDussutour, Audrey. "Organisation spatio-temporelle des déplacements collectifs chez les fourmis." Toulouse 3, 2004. http://www.theses.fr/2004TOU30242.
Full textCHEN, JYUN-HONG, and 陳俊宏. "Domain Name System Amplification Attack Resolution and Defense." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/46avda.
Full text國立雲林科技大學
資訊管理系
105
Domain Name System Amplification Attack (DNS) has been a very common attack type in recent years. As the network grows, it is easy to achieve Denial of Service (DoS) attacks. Paralyze the victim's network, so that the victims can not be normal operation. But also can set the power of the crowd at the same time decentralized distributed denial of service attacks (Distributed Denial of Service, DDoS) is to allow users a headache. Many DNS servers have solutions to this problem, such as the ACL (Access Control List) restriction, the close recursive query function, and so on, can be effectively attacked or exploited to attack the DNS attack attacks. Of the DNS server for adequate protection. But for the end user does not provide good protection measures. In this paper, we study the protection rules of the DNS server and the intrusion detection system based on DNS and the open source intrusion detection system, and combine the characteristics of the attack packets to make the intrusion detection system provide the security of end-user protection DNS amplification attack. Protection. In this paper, an effective DNS amplification attack prevention rule is formulated, so that the internal network server or the end user can have a good security environment not to be amplified attack. This rule can be combined with the intrusion detection system inline mode (Inline Mode) with the firewall can be the actual block (drop, block ... and other actions), or just observe and does not affect the actual flow of the detection mode (Sniffer Mode) , Are can be used with the demand environment. Keywords:DNS, Amplification Attack, DDOS, Snort, intrusion detection systems
LAN, YI-CHIAO, and 籃奕喬. "Defense DNS Distributed Denial of Service Amplification Attack." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/6m7687.
Full text國立中正大學
雲端計算與物聯網數位學習碩士在職專班
106
Nowaday, the enterprise network faces a huge number of network attacks from the Internet. Although many network security equipments and softwares have been deployed in the enterprise network, enterprises still face high security threats. This may due to two main reasons, namely human factor and network system. When administrators receive malicious attack alerts, they must immediately find the device been attacked from many devices and solve the problem with various defneding methods such that the enterprise network can be recovered as soon as possible. A malicious attack may cause the enterprise a huge loss in business. Although most of the network device manufacturers provided RESTful API to the network administrators to reduce the management complexity, the network administrators still face great challenge on dealing with network attachs due to the large number devices and device manufacturers which have their own APIs.. In this thesis, we propose a SDN-based mechanism to tackle with DNS DDoS amplification blocking attack. Through the combination of traditional network and software defined network, the mechanism adopts chat robot as the core of connecting system architecture and machine learning mechanism to implement a centralized control management system and a monitoring system on real-time packet processing. The monitoring rules are based on the history of the query domain name as well as characteristics packet behaviors. An enterprise module is then built to detect anormal packet behaviors in real time. The proposed mechanism can be applied to any enterprise networks such that, in addition to reducing the manpower and network attck handling time, it can improve the quality of the enterprise network..
Lu, Shih-Yang, and 呂世暘. "DDoS Attack Analysis and Prevention based on DNS Amplification – An Example of University of Taipei." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/rs6v42.
Full text臺北市立大學
資訊科學系碩士在職專班
104
DNS is the one of most indispensable infrastructures of Internet service. Any resource connected to the Internet, DNS translate its domain name into IP address. Before the Internet was not yet universal, DNS security was not an important topic at network research. At present people are growing needs for Internet service, DNSs become that hackers attack targets. Recently DNS amplification attacks events of Internet increase rapidly, because DNS protocol has design flaws and the asymmetry in size between DNS queries and replies. Therefore, DNS exists much vulnerability. Hackers can use the distributed Denial of Service attack to destroy DNS services. However, most people were not aware that their DNS servers become accomplices on Internet attacks. In this thesis, we will study an overview of DNS evolution and architecture, and explore the reasons of DNS amplification DDoS attacks. The research sample focuses on University of Taipei. According to these reasons, we propose some related precautions to strengthen the security of our DNS servers and avoid that our DNS servers become accomplices of DNS amplification DDoS attacks. After the implementations by our precautions, our methods are effective.
Books on the topic "Amplification attack"
Nolan, T. J., T. B. Nutman, and G. A. Schad. Strongyloidosis. Oxford University Press, 2011. http://dx.doi.org/10.1093/med/9780198570028.003.0064.
Full textBook chapters on the topic "Amplification attack"
Liu, Zheng, Mingwei Xu, Jiahao Cao, and Qi Li. "TSA: A Two-Phase Scheme Against Amplification DDoS Attack in SDN." In Communications in Computer and Information Science, 483–96. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8890-2_37.
Full textAnagnostopoulos, Marios. "Amplification DoS Attacks." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-642-27739-9_1486-1.
Full textKambourakis, Georgios, Tassos Moschos, Dimitris Geneiatakis, and Stefanos Gritzalis. "Detecting DNS Amplification Attacks." In Critical Information Infrastructures Security, 185–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89173-4_16.
Full textKrupp, Johannes, Mohammad Karami, Christian Rossow, Damon McCoy, and Michael Backes. "Linking Amplification DDoS Attacks to Booter Services." In Research in Attacks, Intrusions, and Defenses, 427–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66332-6_19.
Full textKrämer, Lukas, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, and Christian Rossow. "AmpPot: Monitoring and Defending Against Amplification DDoS Attacks." In Research in Attacks, Intrusions, and Defenses, 615–36. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26362-5_28.
Full textMacFarland, Douglas C., Craig A. Shue, and Andrew J. Kalafut. "Characterizing Optimal DNS Amplification Attacks and Effective Mitigation." In Passive and Active Measurement, 15–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15509-8_2.
Full textColella, Antonio, and Clara Maria Colombini. "Amplification DDoS Attacks: Emerging Threats and Defense Strategies." In Advanced Information Systems Engineering, 298–310. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-319-10975-6_24.
Full textKitagawa, Fuyuki, Takahiro Matsuda, Goichiro Hanaoka, and Keisuke Tanaka. "Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks." In Information Security and Cryptology - ICISC 2014, 84–100. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15943-0_6.
Full textFouque, Pierre-Alain, and Pierre Karpman. "Security Amplification against Meet-in-the-Middle Attacks Using Whitening." In Cryptography and Coding, 252–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45239-0_15.
Full textKopp, Daniel, Christoph Dietzel, and Oliver Hohlfeld. "DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks." In Passive and Active Measurement, 284–301. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72582-2_17.
Full textConference papers on the topic "Amplification attack"
Krupp, Johannes, Michael Backes, and Christian Rossow. "Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2976749.2978293.
Full textHan, Myoungbo, Thang Nguyen Canh, Si Chul Noh, Junmin Yi, and Minho Park. "DAAD: DNS Amplification Attack Defender in SDN." In 2019 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2019. http://dx.doi.org/10.1109/ictc46691.2019.8939897.
Full textYu, Huiming, Xiangfeng Dai, Tom Baxliey, Xiaohong Yuan, and Terry Bassett. "A visualization analysis tool for DNS amplification attack." In 2010 3rd International Conference on Biomedical Engineering and Informatics (BMEI 2010). IEEE, 2010. http://dx.doi.org/10.1109/bmei.2010.5639324.
Full textMehic, M., M. Voznak, J. Safarik, P. Partila, and M. Mikulec. "Using DNS amplification DDoS attack for hiding data." In SPIE Sensing Technology + Applications, edited by Sos S. Agaian, Sabah A. Jassim, and Eliza Y. Du. SPIE, 2014. http://dx.doi.org/10.1117/12.2050700.
Full textMeitei, Irom Lalit, Khundrakpam Johnson Singh, and Tanmay De. "Detection of DDoS DNS Amplification Attack Using Classification Algorithm." In ICIA-16: International Conference on Informatics and Analytics. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2980258.2980431.
Full textZhang, Yuantian, and Yang Cheng. "An Amplification DDoS Attack Defence Mechanism using Reinforcement Learning." In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2019. http://dx.doi.org/10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00145.
Full textChang Liu, Gang Xiong, Jie Liu, and Gaopeng Gou. "Detect the reflection amplification attack based on UDP protocol." In 2015 10th International Conference on Communications and Networking in China (ChinaCom). IEEE, 2015. http://dx.doi.org/10.1109/chinacom.2015.7497948.
Full textXing, Xiaodong, Tao Luo, Jianfeng Li, and Yang Hu. "A defense mechanism against the DNS amplification attack in SDN." In 2016 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC). IEEE, 2016. http://dx.doi.org/10.1109/icnidc.2016.7974530.
Full textSoliman, Ahmed K., Cherif Salama, and Hoda K. Mohamed. "Detecting DNS Reflection Amplification DDoS Attack Originating from the Cloud." In 2018 13th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2018. http://dx.doi.org/10.1109/icces.2018.8639414.
Full textKo, Eunhye, Seongmin Park, Sekwon Kim, Kyungho Son, and Hwankuk Kim. "SIP amplification attack analysis and detection in VoLTE service network." In 2016 International Conference on Information Networking (ICOIN). IEEE, 2016. http://dx.doi.org/10.1109/icoin.2016.7427126.
Full text