Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol

R Fotohi, S Firoozi Bari, M Yusefi - International Journal of …, 2020 - Wiley Online Library
Wireless sensor networks (WSNs) have been vastly employed in the collection and
transmission of data via wireless networks. This type of network is nowadays used in many …

[PDF][PDF] An adaptive SYN flooding attack mitigation in DDOS environment

K Hussain, SJ Hussain, V Dillshad… - … Journal of Computer …, 2016 - researchgate.net
A honeypot being an information security server attract the hackers towards it by showing
open ports and services and monitor network traffic closely by playing some key feature …

[PDF][PDF] يﺎﺳآ ﻞﯿﺳ تﻼﻤﺣ يراﺬﮔﺮﯿﺛﺎﺗ ﺶﻫﺎﮐ SYN

M Momeni, S Gharravi, F Hourali - academia.edu
TCP connection management is susceptible to a classic attack called SYN-flooding. In this
attack, the source sends a large number of SYN segments to the victim system, without …

[PDF][PDF] Utiliser les ressources réseaux pour atténuer les attaques DDoS volumétriques

PE FABRE - researchgate.net
Résumé Les attaques massives par déni de service représentent une menace pour les
services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la …

Using network resources to mitigate volumetric DDoS

PE Fabre - 2018 - theses.hal.science
Massive Denial of Service attacks represent a genuine threat for Internet service, but also
significantly impact network service providers and even threat the Internet stability. There is …

[PDF][PDF] Proposing a New Filter to Remove Impulse Noise and its Composition with PSO Algorithm to Detect and Defense against SYN Flooding Attacks

M Momeny, MA Sarram, V Shaker, S Jamali… - 2016 - sid.ir
In a DoS attack can be regarded as an attempt of attackers to prevent legal users from
gaining a normal network service. The TCP connection management protocol sets a position …

³ ½ ć ½ ½ ½ ³ Ć½ ³ ČĆ Ć³ ½ Ć³

ČĆ Ć³½ - akhlagh.morsalat.ir
. ³ ³ ³ ½ ــ ć ³ čـ ـ ½ـ ³ ćـş ½ـ Ćč ½ـ ـ Ş ، ـ Ş .Ć ـ Č½ـ ³ ćـ ½ ، ـ ½ـ Č³ Page 1 11 ³ ½ć½ ½ ½ ³ Ć½ ³
ČĆ Ć³½ Ć³ ³ ½ – ş ČĆ ³ Č½ ، ½ ۲۸ ، ½ ۵۰ ، ½ ۱۳۹۶ ½Ş ۳۶-۱۱ AKHLAGH Religious Extension …

[PDF][PDF] Detection of Pulsing DoS Attacks at Their Source Networks

M Yu, X Li - International Journal of Computer Science Issues …, 2013 - Citeseer
Abstract Pulsing Denial of Service (PDoS) is a type of DoS attack. Its attacking behavior is
intermittent rather than constant, which helps it avoid being detected. In this paper, an …

[PDF][PDF] کاهش تاثیرگذاری حملات سیل آسای SYN با ارتقای دقت الگوریتم PSO توسط فیلتر موثر انطباقی

مومنی, غراوی, ثریا, حورعلی - روش‌های هوشمند در صنعت برق, 2019‎ - journals.iau.ir
TCP connection management is susceptible to a classic attack called SYN-flooding. In this
attack, the source sends a large number of SYN segments to the victim system, without …

[PDF][PDF] رﻮﮕﻟا ﻢﺘﻳ ﻬﺑ ﻪﻨﻴ يزﺎﺳ تارذ عﺎﻤﺘﺟا

IP سردآ ﺮﮔا‎ - sid.ir
ي آﺳﺎ ﻴﻞ در ﺑﺮاﺑﺮ ﺣﻤﻼت ﺳ ﺑﻪ ﻣﻨﻈﻮر ﻛﺸﻒ و دﻓﺎع ﻳﺘﻢ و اﻟﮕﻮر Page 1 ﮔرﺎﻜﺑ يﺮﻴ ﻓ ﺮﺘﻠﻴ MDBUTMF رﻮﮕﻟا و ﻢﺘﻳ PSO
عﺎﻓد و ﻒﺸﻛ رﻮﻈﻨﻣ ﻪﺑ ﺳ تﻼﻤﺣ ﺮﺑاﺮﺑ رد ﻞﻴ ﺎﺳآ ي SYN ﻲﻨﻣﻮﻣ ﺪﻤﺤﻣ 1، يﺪﻬﻣ ﺎﻗآ ماﺮﺻ 2، ﻒﻴﻄﻟ ﺪﻤﺤﻤﻴﻠﻋ 3 1 ﺳﺪﻨﻬﻣ هوﺮﮔ …