To see the other types of publications on this topic, follow the link: Flooding attack.

Dissertations / Theses on the topic 'Flooding attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 dissertations / theses for your research on the topic 'Flooding attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Margotta, Fabrizio. "DoS and DDoS attacks in Named Data Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21855/.

Full text
Abstract:
La nascita di Internet ha portato benefici senza precedenti in termini sociali ed economici. Le tecnologie e i protocolli inizialmente adottati andavano a risolvere i problemi causati dall’inaffidabilità della preesistente linea telefonica e nel corso dei vari decenni hanno garantito il funzionamento delle comunicazioni globali. Tuttavia ci si pone delle domande sulla necessità di un nuovo cambio di paradigma che risponda alle nuove esigenze riscontrate nell’evoluzione di Internet stesso e dei servizi offerti. Named Data Networking, come progetto della famiglia delle Future Internet Architec
APA, Harvard, Vancouver, ISO, and other styles
2

Dudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.

Full text
Abstract:
This diploma thesis deals with the design and implementation of a tool for network attack detection from a captured network communication. It utilises the tshark packet analyser, the meaning of which is to convert the input file with the captured communications to the PDML format. The objective of this conversion being, increasing the flexibility of input data processing. When designing the tool, emphasis has been placed on the ability to expand it to detect new network attacks and on integrating these additions with ease. For this reason, the thesis also includes the design of a complex decla
APA, Harvard, Vancouver, ISO, and other styles
3

You, Yonghua. "A defense framework for flooding-based DDoS attacks." Thesis, Kingston, Ont. : [s.n.], 2007. http://hdl.handle.net/1974/653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Makke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Thesis, Paris 5, 2014. http://www.theses.fr/2014PA05S006/document.

Full text
Abstract:
L'un des défis majeurs du monde de ces dernières décennies a été l'augmentation continue de la population des personnes âgées dans les pays développés. D’où la nécessité de fournir des soins de qualité à une population en croissance rapide, tout en réduisant les coûts des soins de santé. Dans ce contexte, de nombreux travaux de recherche portent sur l’utilisation des réseaux de capteurs sans fil dans les systèmes WBAN (Wireless Body Area Network), pour faciliter et améliorer la qualité du soin et de surveillance médicale à distance. Ces réseaux WBAN soulèvent de nouveaux défis technologiques e
APA, Harvard, Vancouver, ISO, and other styles
5

Kang, Min Suk. "Handling Large-Scale Link-Flooding Attacks in the Internet." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/833.

Full text
Abstract:
Link-flooding attacks in which an adversary coordinates botnet messages to exhaust the bandwidth of selected network links in the core of the Internet (e.g., Tier-1 or Tier-2 networks) have been a powerful means of denial of service. In the past few years, these attacks have moved from the realm of academic curiosities to real-world incidents. Unfortunately, we have had a limited understanding of this type of attacks and effective countermeasures in the current Internet. In this dissertation, we address this gap in our understanding of link-flooding attacks and propose a two-tier defense appro
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Soo Bum. "Localizing the effects of link flooding attacks in the internet." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/10052.

Full text
Abstract:
Thesis (Ph.D.) -- University of Maryland, College Park, 2009.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
7

Akbar, Yousef M. A. H. "Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98554.

Full text
Abstract:
The power grid has changed a great deal from what has been generally viewed as a traditional power grid. The modernization of the power grid has seen an increase in the integration and incorporation of computing and communication elements, creating an interdependence of both physical and cyber assets of the power grid. The fast-increasing connectivity has transformed the grid from what used to be primarily a physical system into a Cyber- Physical System (CPS). The physical elements within a power grid are well understood by power engineers; however, the newly deployed cyber aspects are new to
APA, Harvard, Vancouver, ISO, and other styles
8

Signorello, Salvatore. "A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0109/document.

Full text
Abstract:
Ce travail illustre comment les tendances actuelles d'utilisation dominantes sur Internet motivent la recherche sur des architectures futures de réseau plus orientées vers le contenu. Parmi les architectures émergentes pour l'Internet du futur, le paradigme du Information-Centric Networking (ICN) est présenté. ICN vise à redéfinir les protocoles de base d'Internet afin d'y introduire un changement sémantique des hôtes vers les contenus. Parmi les architectures ICN, le Named-Data Networking (NDN) prévoit que les demandes nommées de contenus des utilisateurs soient transmises par leur nom dans l
APA, Harvard, Vancouver, ISO, and other styles
9

Bediako, Peter Ken. "Long Short-Term Memory Recurrent Neural Network for detecting DDoS flooding attacks within TensorFlow Implementation framework." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66802.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks is one of the most widespread security attacks to internet service providers. It is the most easily launched attack, but very difficult and expensive to detect and mitigate. In view of the devastating effect of DDoS attacks, there has been the increase on the adaptation of a network detection technique to reveal the presence of DDoS attack before huge traffic buildup to prevent service availability. Several works done on DDoS attack detection reveals that, the conventional DDoS attack detection methods based on statistical divergence is useful, howe
APA, Harvard, Vancouver, ISO, and other styles
10

Makke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Electronic Thesis or Diss., Paris 5, 2014. http://www.theses.fr/2014PA05S006.

Full text
Abstract:
L'un des défis majeurs du monde de ces dernières décennies a été l'augmentation continue de la population des personnes âgées dans les pays développés. D’où la nécessité de fournir des soins de qualité à une population en croissance rapide, tout en réduisant les coûts des soins de santé. Dans ce contexte, de nombreux travaux de recherche portent sur l’utilisation des réseaux de capteurs sans fil dans les systèmes WBAN (Wireless Body Area Network), pour faciliter et améliorer la qualité du soin et de surveillance médicale à distance. Ces réseaux WBAN soulèvent de nouveaux défis technologiques e
APA, Harvard, Vancouver, ISO, and other styles
11

Signorello, Salvatore. "A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks." Electronic Thesis or Diss., Université de Lorraine, 2018. http://www.theses.fr/2018LORR0109.

Full text
Abstract:
Ce travail illustre comment les tendances actuelles d'utilisation dominantes sur Internet motivent la recherche sur des architectures futures de réseau plus orientées vers le contenu. Parmi les architectures émergentes pour l'Internet du futur, le paradigme du Information-Centric Networking (ICN) est présenté. ICN vise à redéfinir les protocoles de base d'Internet afin d'y introduire un changement sémantique des hôtes vers les contenus. Parmi les architectures ICN, le Named-Data Networking (NDN) prévoit que les demandes nommées de contenus des utilisateurs soient transmises par leur nom dans l
APA, Harvard, Vancouver, ISO, and other styles
12

Mouton, Francois. "Digital forensic readiness for wireless sensor network environments." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.

Full text
Abstract:
The new and upcoming field of wireless sensor networking is unfortunately still lacking in terms of both digital forensics and security. All communications between different nodes (also known as motes) are sent out in a broadcast fashion. These broadcasts make it quite difficult to capture data packets forensically and, at the same time, retain their integrity and authenticity. The study presents several attacks that can be executed successfully on a wireless sensor network, after which the dissertation delves more deeply into the flooding attack as it is one of the most difficult attacks to a
APA, Harvard, Vancouver, ISO, and other styles
13

Hu, Che-Wei, and 胡哲維. "Flooding Attack Prevention in Mobile Ad-hoc Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/58371317933400904202.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程學系<br>99<br>Mobile ad hoc networks are usually deployed in many environments, such as the environment is not easy to build by wired or fixed nodes. The nodes in the network are unattended and easy be attacked because of congenital weak physical protection. Mobile ad hoc networks are vulnerable to the denial-of-service (DOS) attacks. Flooding DOS attacks are new and powerful attacks against on-demand Ad Hoc routing protocols. In 2005, the single scheme proposed to resist such attack was the Flooding Attack Prevention. In 2006, another scheme to resist this kind of attacks was
APA, Harvard, Vancouver, ISO, and other styles
14

Sun, Jia-Rong, and 孫加榮. "The Study on Investigation Procedure of Cybercrime for SYN Flooding Attack." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/58659357419922884220.

Full text
Abstract:
博士<br>亞洲大學<br>資訊工程學系<br>103<br>The cybercrime with the development of networks, it has many crime types, include network attack, mail fraud, intimidation, copyright infringement, and so on. For network attack, many approaches have been proposed to detect and defense. However, after confirm the network attack or others crime exist, it still needs to execute the investigation procedure by the investigators, collect the evidences related to the crime, find the perpetrators, and prosecute them. This study aims to propose a new cybercrime investigation approach, which is used to find the criminal
APA, Harvard, Vancouver, ISO, and other styles
15

黃小玲. "Design a Hybrid Flooding Attack Defense Scheme under the Cloud Computing Environment." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/8kgstz.

Full text
Abstract:
碩士<br>東吳大學<br>資訊管理學系<br>107<br>Cloud computing is integrated lots of computing resources which are provided to users over the internet on a Pay-As-You-Go mode. While multi-tenants and resources sharing are its advantages under the cloud computing environment, it also brings new risks in information security. One of the more difficult consequences of an attack is a flooding attack. This attack is to exhaust the network bandwidth and the computing resources of the server, causing the server to fail to provide services due to heavy workload and may affect the service. Other servers in the same in
APA, Harvard, Vancouver, ISO, and other styles
16

Chen, Ching-Ru, and 陳慶儒. "A Detection Scheme for Flooding Attack on Application Layer based on Semantic Concept." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/38211153921649740071.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程學系<br>98<br>With the development of the Internet, application programs on the web page become widespread. Information appearing on the web page has evolved from static presentation to dynamic presentation and even being interactive with the users. Some malicious users employ malicious browsing behaviors, such as flooding attack, to cause waste of resources and bandwidth of the host for the web page. Since the advent of cloud computing technology, flooding attack on the application layer no longer has the ability to cause complete denial of service to a Web server. But resou
APA, Harvard, Vancouver, ISO, and other styles
17

Yi-Hsing, Lin, and 林益興. "A Priority and Trust Value Scheme to Inhibit the Flooding Attack in Ad Hoc Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/01297367521738870405.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程學系<br>98<br>Mobile ad hoc networks often deployed in many kinds of environments such as these places where are not easy to deploy infrastructure. The nodes in the network are unattended and easy be attacked because of congenital weak physical protection. Mobile ad hoc networks are particularly vulnerable to Denial of Service attacks. Flooding denial of service attacks are new and powerful attacks against on-demand Ad Hoc routing protocols. At present, the single scheme proposed to resist such attack is Flooding Attack Prevention proposed in 2005. And another scheme to resist
APA, Harvard, Vancouver, ISO, and other styles
18

Wei, Hung-Chuan, and 魏鴻娟. "Counteracting UDP Flooding Attacks in SDN." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/56753540948380371723.

Full text
Abstract:
碩士<br>元智大學<br>資訊工程學系<br>104<br>Software-defined networking (SDN) is a new network architecture with the central control. The purpose is to allow network to become more flexible and easier to manage. Besides, the need for the resources and services of applications can have better also management. SDN architecture is to separate the control plane and data plane. Control plane uses a controller to centrally manage SDN switch, while the data plane handles only data transmission, which can reduce the difficulty of management. SDN using OPENFLOW protocol to connect the control plane and data pl
APA, Harvard, Vancouver, ISO, and other styles
19

Guo, Yinghua. "Defending MANETs against flooding attacks by detective measures." 2008. http://arrow.unisa.edu.au:8081/1959.8/45723.

Full text
Abstract:
Mobile ad hoc networks (MANETs), due to their unique characteristics (e.g., unsecured wireless channel, dynamic mobility, absence of central supportive infrastructure and limited resources), are suffering from a wide range of security threats and attacks. Particularly, MANETs are susceptible to the Denial of Service (DoS) attack that aims to disrupt the network by consuming its resources. In MANETs, a special form of DoS attack has emerged recently as a potentially major threat: the flooding attack. This attack recruits multiple attack nodes to flood the MANET with overwhelming broadcast traff
APA, Harvard, Vancouver, ISO, and other styles
20

Chang, Chung-Cheng, and 張仲丞. "Withstanding Malicious RREQ Packets Flooding Attacks in MANET." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06901169012462375417.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>95<br>Mobile ad hoc network (MANET) is a group of mobile wireless nodes that communicate with each other without the aid of the infrastructure such as base station. It has been used in many applications, for example, military application, personal electronic device, ad hoc meeting, etc. Because of the shortcoming of the routing protocol, MANET is vulnerable to some kinds of attacks. Black hole attack, gray hole attack, wormhole attack, traffic analysis attack, and rushing attack are common attacks in ad hoc network. In this thesis, we introduce a critical attack in MA
APA, Harvard, Vancouver, ISO, and other styles
21

Liu, Xin. "Mitigating Denial-of-Service Flooding Attacks with Source Authentication." Diss., 2012. http://hdl.handle.net/10161/5756.

Full text
Abstract:
<p>Denial-of-Service (DoS) flooding attacks have become a serious threat to the reliability of the Internet. For instance, a report published by Arbor Networks reveals that the largest DoS flooding attack observed in 2010 reaches 100Gbps in attack traffic volume. The defense against DoS flooding attacks is significantly complicated by the fact that the Internet lacks accountability at the network layer: it is very difficult, if not impossible, for the receiver of an IP packet to associate the packet with its real sender, as the sender is free to craft any part of the packet.</p><p>This dissert
APA, Harvard, Vancouver, ISO, and other styles
22

Tsai, Shang-Ting, and 蔡尚庭. "Maintaining Suspicious Flows using Cache Replacement under Flooding Attacks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/67987822495899340514.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>103<br>Network monitoring approaches have been popularly applied into networksproposed and developed throughout the years. However, the packet-based approach cannot easily be easily performed in at high-speeds networks, so . Therefore, researchers focusedstarted on investigating an alternative approaches, the such as flow-based approach. In a Within the typical architecture of typical flow monitoring, packets are aggregated into flows, which stored in a flow cache for , and then further analysis later. However, the flow cache size is limitedfixed. When network attack
APA, Harvard, Vancouver, ISO, and other styles
23

Lien, Chih-Chieh, and 連志捷. "Detection Method Based on Reverse Proxy against Web Flooding Attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/54904637344397782249.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程與科學系<br>97<br>Web servers face all kinds of users; some of them engage malicious activities, such as flooding attacks. As a result, lots of resource and bandwidth on web sites might be wasted. In this thesis, we propose a detection method, which is based on reverse proxy servers, to detect the flooding attacks. Our proposed method can be incorporated in a priority queue-based scheme to enhance quality of service for normal users. We have done performance evaluation of our method by implementing it on a server with heavy loads. The experimental results show that our method is
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Fu-ping, and 陳復平. "A Novel TCP Implementation for Defending Against TCP SYN Flooding Attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/45765546490259627806.

Full text
Abstract:
碩士<br>義守大學<br>資訊工程學系碩士班<br>93<br>With the rapid growth and increasing popularity of the Internet and E-Commerce, Denial of Service (DoS) attacks have become one of new criminal actions. More are TCP SYN Flood attacks, since the attackers can easily take advantage of the TCP specification to generate traffic making the services of public servers unavailable. Each time a client attempts to create a connection with a server, some connection state information is stored on the server. Since the connection state information stored requires memory and operating system resources, only a limited number
APA, Harvard, Vancouver, ISO, and other styles
25

Sun, Wen-Chen, and 孫文駿. "On the Research of Intrusion Tolerance Network Counter the Internet Flooding Attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/59su3h.

Full text
Abstract:
博士<br>國立中央大學<br>資訊管理研究所<br>97<br>Flooding based attack is always a critical threat to the Internet security. Due to the sophisticated hacking skills, nowadays, a lot of the modern malicious programs could cause global flooding attack in short period time. The zero-day polymorphic worms are the most pressing threat. The zero-day polymorphic worms not only exploit unknown vulnerabilities but also change their own representations on each new infection to evade detection. Therefore, the worms have the ability to rapidly infect a tremendous numbers of hosts and cause massive denial of service aroun
APA, Harvard, Vancouver, ISO, and other styles
26

彭柏蒼. "A Study of Resisting Flooding Attacks in AODV Based Ad Hoc Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/80939054299659324744.

Full text
Abstract:
碩士<br>中華大學<br>資訊工程學系(所)<br>95<br>Mobile ad hoc network always has little or no physical protection against intruding, due to their improvised nature, are frequently established in insecure environments and hence become susceptible to attacks which are launched by participating malicious nodes against different network services. The ad hoc network is defenseless to denial of service (DOS) attack. In ad hoc network the DOS attack, called Ad Hoc Flooding Attacks, especially using on-demand routing protocol in ad hoc networks, such as Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Rout
APA, Harvard, Vancouver, ISO, and other styles
27

Lai, Shin-Pin, and 賴信斌. "A Semantic Rule-based Detection Scheme against Flooding Attacks on Application Layer." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/50416141122060759526.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程學系<br>100<br>Along with the progress of the Internet, more and more applications are provided with Web services. The content of the web page has evolved from static into dynamic. People are able to interact with the web page. However, some malicious users have malicious browsing behaviors, such as flooding attacks, to waste the resources and bandwidth of the host of the web page. Nowadays, more and more web services are built on cloud computing. Flooding attacks on the application layer may have no ability to cause denial of service to a Web server on cloud computing, but res
APA, Harvard, Vancouver, ISO, and other styles
28

Chiang, Min-Hung, and 江敏宏. "Using BGP Blackhole technology to prevent flooding-based distributed denial of service attacks." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/17724540234650043223.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊網路多媒體研究所<br>100<br>Distributed denial of services (DDoS) is the most difficult attacking threat to be prevented. The amount of packets from a DDoS attack would result in backbone paralysis. There are three common approaches which can prevent the flooding-based DDoS attacks. Blackhole routing; unicast reverse path forwarding; and sinkhole routing. Sinkhole routing which requires hardware support is fairly complex, and unicast reverse path forwarding which might change the edge router deployment among ISPs could result in high overload over edge routers. The thesis proposes a s
APA, Harvard, Vancouver, ISO, and other styles
29

Tzeng-Yu, Chen. "An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0016-1303200709313176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Tzeng-Yu, and 陳宗右. "An Effective Intrusion Prevention System to Protect Multi-Services against TCP SYN Flooding DDoS Attacks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/36453050738828817765.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>94<br>In recent years, DDoS attacks occur frequently and cause a great deal of damage to enterprises that provide network services. With the growth of the network, almost every enterprise provides more and more services on the network, like Web service, Mail service, Ftp service, and so on. If these services suffer the DDoS attack, it will cause great losses to the enterprise. The famous type of the DDoS attack is TCP SYN flooding attack and it is based on the vulnerability of the TCP three-way handshake. The firewall and intrusion detection system are not effectively
APA, Harvard, Vancouver, ISO, and other styles
31

"A Proactive Approach to Detect IoT Based Flooding Attacks by Using Software Defined Networks and Manufacturer Usage Descriptions." Master's thesis, 2018. http://hdl.handle.net/2286/R.I.50539.

Full text
Abstract:
abstract: The advent of the Internet of Things (IoT) and its increasing appearances in Small Office/Home Office (SOHO) networks pose a unique issue to the availability and health of the Internet at large. Many of these devices are shipped insecurely, with poor default user and password credentials and oftentimes the general consumer does not have the technical knowledge of how they may secure their devices and networks. The many vulnerabilities of the IoT coupled with the immense number of existing devices provide opportunities for malicious actors to compromise such devices and use the
APA, Harvard, Vancouver, ISO, and other styles
32

Chou, Kang-Hsien Lee Wang-Chien. "Self-determining forwarding scheme for defending against query-flooding based ddos attacks in unstructured peer-to-peer systems." 2008. http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-3525/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rasool, Raihan Ur. "CyberPulse: A Security Framework for Software-Defined Networks." Thesis, 2020. https://vuir.vu.edu.au/42172/.

Full text
Abstract:
Software-Defined Networking (SDN) technology provides a new perspective in traditional network management by separating infrastructure plane from the control plane which facilitates a higher level of programmability and management. While centralized control provides lucrative benefits, the control channel becomes a bottleneck and home to numerous attacks. We conduct a detailed study and find that crossfire Link Flooding Attacks (LFA) are one of the most lethal attacks for SDN due to the utilization of low-rate traffic and persistent attacking nature. LFAs can be launched by the malicious adver
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!