Common network attack types and defense mechanisms

R Daş, A Karabade, G Tuna - 2015 23nd signal processing and …, 2015 - ieeexplore.ieee.org
For every organization having a well secured network is the primary requirement to reach
their goals. A network is said to be secure if it can protect itself from sophisticated attacks …

Taxonomy based intrusion attacks and Detection management scheme in peer-to-peer network

PK Singh, R Sharma, AK Vatsa… - International Journal of …, 2012 - search.proquest.com
A intrusion provides an unauthorized access, damage or disruption of the network. The
process can understand the characteristics and nature of an intruder. The paper presents …

Effects of denial of service attack in WIFI-broadband networks.

YN Akende - 2022 - dspace.unza.zm
This Dissertation investigates the effect of Denial-of-Service (DoS) attacks in Broadband-Wi-
Fi networks involving public sector networks. Over the recent past, Wireless communications …

[PDF][PDF] Using Access Control List against Denial of service attacks

HS Hawedi, OA Bentaher… - مجلة العلوم الاقتصادية …, 2017‎ - researchgate.net
The network security is very important in our daily life as people using the internet
everywhere such as e-commerce, e-government, e-learning….. etc. One of the major threat …

Technology Trends Analysis of Airbone Network

KH Kim, HH Kim, SG Lee, HJ Lee, YJ Ryu - International Journal of …, 2016 - earticle.net
Development with IT technology has wide effect for military sector. For this reasons, the
important sources is 'First see, and first determine, and first attack'in modern and future …

[PDF][PDF] Amplification-based attack models for discontinuance of conventional network transmissions

M Malekzadeh, M Ashrostaghi… - Int. J. Inf. Eng. Electron …, 2015 - mecs-press.org
Amplification attacks take advantage of insecurity of different OSI layers. By targeting
broadcast address of the victim networks and sending a few packets by the attackers, they …

[PDF][PDF] PEER NETWORK

PK Singh, AK Vatsa, R Sharma, P Tyagi - researchgate.net
A intrusion provides an unauthorized access, damage or disruption of the network. The
process can understand the characteristics and nature of an intruder. The paper presents …

[PDF][PDF] DETECTING AND PREVENTING ASSAULTS ON NETWORK TRANSPORT FOR LINUX SYSTEMS

GRK Rao - Citeseer
Network Security is an area of major concern to any organization. This paper focuses on
various types of attacks on the network & transport layers and presents samples of scripts …

[인용][C] A review: DoS and DDoS attacks

M Malik, Y Singh - International Journal of Computer Science and Mobile …, 2015

[인용][C] Asst. Professor

VP Thakur