ANALYSIS OF THE MAIN ASPECTS OF THE IMPACT OF DoS-ATTACKS ON COMPUTER NETWORK PERFORMANCE
Analysis of the main types of DoS-attacks has carried out. The ways of their realization for attacks of computer networks and possibilities of protection against them have considered.
| Published in: | Sučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni |
|---|---|
| Main Authors: | Ihor V. Ruban, Yevhenii S. Loshakov, Dmytro V. Prybylnov |
| Format: | Article |
| Language: | English |
| Published: |
Національний університет оборони України
2013-11-01
|
| Subjects: | |
| Online Access: | http://sit.nuou.org.ua/article/view/39053 |
Similar Items
Evolving Malware and DDoS Attacks: Decadal Longitudinal Study
by: Olufunsho I. Falowo, et al.
Published: (2024-01-01)
by: Olufunsho I. Falowo, et al.
Published: (2024-01-01)
SAPA-based approach for defending DoS attacks in cloud computing
by: Meng YUE, et al.
Published: (2017-04-01)
by: Meng YUE, et al.
Published: (2017-04-01)
SAPA-based approach for defending DoS attacks in cloud computing
by: Meng YUE, et al.
Published: (2017-04-01)
by: Meng YUE, et al.
Published: (2017-04-01)
Denial-of-Service Attacks on Permissioned Blockchains: A Practical Study
by: Mohammad Pishdar, et al.
Published: (2025-06-01)
by: Mohammad Pishdar, et al.
Published: (2025-06-01)
The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems
by: Zisis Tsiatsikas, et al.
Published: (2019-01-01)
by: Zisis Tsiatsikas, et al.
Published: (2019-01-01)
Understanding and Classifying Permanent Denial-of-Service Attacks
by: Stanislav Abaimov
Published: (2024-05-01)
by: Stanislav Abaimov
Published: (2024-05-01)
Detection of Low-Intensity DoS Attacks by Using a Combined Neural Network Using a DoS Attack Level Analysis Algorithm
by: Artem S. Turashev, et al.
Published: (2022-12-01)
by: Artem S. Turashev, et al.
Published: (2022-12-01)
A collaborative prediction approach to defend against amplified reflection and exploitation attacks
by: Arvind Prasad, et al.
Published: (2023-09-01)
by: Arvind Prasad, et al.
Published: (2023-09-01)
Threat Actors’ Tenacity to Disrupt: Examination of Major Cybersecurity Incidents
by: Olufunsho I. Falowo, et al.
Published: (2022-01-01)
by: Olufunsho I. Falowo, et al.
Published: (2022-01-01)
Perspectives and Reviews in the Development and Evolution of the Zero-Day Attacks
by: Cosmin Alexandru TEODORESCU
Published: (2022-01-01)
by: Cosmin Alexandru TEODORESCU
Published: (2022-01-01)
Analysis of DoS attacks on Docker inter-component stdio copy
by: Tianyu ZHOU, et al.
Published: (2020-12-01)
by: Tianyu ZHOU, et al.
Published: (2020-12-01)
SlowITe, a Novel Denial of Service Attack Affecting MQTT
by: Ivan Vaccari, et al.
Published: (2020-05-01)
by: Ivan Vaccari, et al.
Published: (2020-05-01)
Runtime verification approach for DoS attack detection in edge servers
by: Bin YU, et al.
Published: (2021-09-01)
by: Bin YU, et al.
Published: (2021-09-01)
Runtime verification approach for DoS attack detection in edge servers
by: Bin YU, et al.
Published: (2021-09-01)
by: Bin YU, et al.
Published: (2021-09-01)
Packet Injection Exploiting Attack and Mitigation in Software-Defined Networks
by: Jishuai Li, et al.
Published: (2022-01-01)
by: Jishuai Li, et al.
Published: (2022-01-01)
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange
by: Szilard Pfeiffer, et al.
Published: (2024-01-01)
by: Szilard Pfeiffer, et al.
Published: (2024-01-01)
AccFlow: Defending against the Low-Rate TCP DoS Attack in Drones
by: Yuan Cao, et al.
Published: (2023-10-01)
by: Yuan Cao, et al.
Published: (2023-10-01)
Adaptive control of networked control systems under DoS attacks
by: Mengting Wang, et al.
Published: (2024-12-01)
by: Mengting Wang, et al.
Published: (2024-12-01)
An Analysis into Physical and Virtual Power Draw Characteristics of Embedded Wireless Sensor Network Devices under DoS and RPL-Based Attacks
by: Patryk Przybocki, et al.
Published: (2023-02-01)
by: Patryk Przybocki, et al.
Published: (2023-02-01)
A DoS attack detection method based on adversarial neural network
by: Yang Li, et al.
Published: (2024-08-01)
by: Yang Li, et al.
Published: (2024-08-01)
Control-Flow Integrity: Attacks and Protections
by: Sarwar Sayeed, et al.
Published: (2019-10-01)
by: Sarwar Sayeed, et al.
Published: (2019-10-01)
DOS-АТАКИ КАК КАТАСТРОФА «ЗВЕЗДА»
by: Гуц А.К.
Published: (2025-01-01)
by: Гуц А.К.
Published: (2025-01-01)
Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack
by: Gildas Avoine, et al.
Published: (2018-05-01)
by: Gildas Avoine, et al.
Published: (2018-05-01)
Denial of Service (DoS) attack identification and analyse using sniffing technique in the network environment
by: Alexis Fidele Kagiraneza, et al.
Published: (2020-01-01)
by: Alexis Fidele Kagiraneza, et al.
Published: (2020-01-01)
Assessment of probabilities of computer attacks based on function
by: Olga S. Makarova, et al.
Published: (2020-06-01)
by: Olga S. Makarova, et al.
Published: (2020-06-01)
Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning
by: F. Zahra, et al.
Published: (2022-09-01)
by: F. Zahra, et al.
Published: (2022-09-01)
Event-triggered synchronization control for neural networks against DoS attacks
by: Yawei Liu, et al.
Published: (2025-01-01)
by: Yawei Liu, et al.
Published: (2025-01-01)
Capturing low-rate DDoS attack based on MQTT protocol in software Defined-IoT environment
by: Mustafa Al-Fayoumi, et al.
Published: (2023-09-01)
by: Mustafa Al-Fayoumi, et al.
Published: (2023-09-01)
Secure Consensus Control for Connected Vehicle Systems With Resilient Predictors Against Denial-of-Service Attacks
by: Yonggui Liu, et al.
Published: (2024-01-01)
by: Yonggui Liu, et al.
Published: (2024-01-01)
Improving Attack Detection in IoV with Class Balancing and Feature Selection
by: Thierry Widyatama, et al.
Published: (2025-03-01)
by: Thierry Widyatama, et al.
Published: (2025-03-01)
Co-Design of Dual Security Control and Communication for Nonlinear CPS Under DoS Attack
by: Li Zhao, et al.
Published: (2020-01-01)
by: Li Zhao, et al.
Published: (2020-01-01)
Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems
by: John Kafke, et al.
Published: (2022-10-01)
by: John Kafke, et al.
Published: (2022-10-01)
Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing
by: Abdelali Saidi, et al.
Published: (2017-03-01)
by: Abdelali Saidi, et al.
Published: (2017-03-01)
Web plug-in paradigm for anti-DoS attack based on end hopping
by: Le-yi SHI, et al.
Published: (2017-10-01)
by: Le-yi SHI, et al.
Published: (2017-10-01)
Web plug-in paradigm for anti-DoS attack based on end hopping
by: Le-yi SHI, et al.
Published: (2017-10-01)
by: Le-yi SHI, et al.
Published: (2017-10-01)
Observer-Based Secure Control for Vehicular Platooning Under DoS Attacks
by: Sakineh Khodadadi, et al.
Published: (2023-01-01)
by: Sakineh Khodadadi, et al.
Published: (2023-01-01)
Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution
by: Nicholas BELIZ, et al.
Published: (2012-09-01)
by: Nicholas BELIZ, et al.
Published: (2012-09-01)
Adaptive control of bilateral teleoperation systems under denial-of-service attacks
by: Lanyan Wei, et al.
Published: (2025-02-01)
by: Lanyan Wei, et al.
Published: (2025-02-01)
Stackelberg game-based optimal secure control against hybrid attacks for networked control systems
by: Wei Xiong, et al.
Published: (2025-09-01)
by: Wei Xiong, et al.
Published: (2025-09-01)
Group Consensus Using Event-Triggered Control for Second-Order Multi-Agent Systems under Asynchronous DoS Attack
by: Yuhang Pan, et al.
Published: (2024-08-01)
by: Yuhang Pan, et al.
Published: (2024-08-01)
Similar Items
-
Evolving Malware and DDoS Attacks: Decadal Longitudinal Study
by: Olufunsho I. Falowo, et al.
Published: (2024-01-01) -
SAPA-based approach for defending DoS attacks in cloud computing
by: Meng YUE, et al.
Published: (2017-04-01) -
SAPA-based approach for defending DoS attacks in cloud computing
by: Meng YUE, et al.
Published: (2017-04-01) -
Denial-of-Service Attacks on Permissioned Blockchains: A Practical Study
by: Mohammad Pishdar, et al.
Published: (2025-06-01) -
The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems
by: Zisis Tsiatsikas, et al.
Published: (2019-01-01)
