Fundamental scaling laws of covert DDoS attacks

2021 ◽  
Vol 151 ◽  
pp. 102236
Author(s):  
Amir Reza Ramtin ◽  
Philippe Nain ◽  
Daniel Sadoc Menasche ◽  
Don Towsley ◽  
Edmundo de Souza e Silva
Keyword(s):  
1994 ◽  
Vol 144 ◽  
pp. 185-187
Author(s):  
S. Orlando ◽  
G. Peres ◽  
S. Serio

AbstractWe have developed a detailed siphon flow model for coronal loops. We find scaling laws relating the characteristic parameters of the loop, explore systematically the space of solutions and show that supersonic flows are impossible for realistic values of heat flux at the base of the upflowing leg.


1993 ◽  
Vol 3 (10) ◽  
pp. 2041-2062 ◽  
Author(s):  
M. J. Thill ◽  
H. J. Hilhorst

2000 ◽  
Vol 627 ◽  
Author(s):  
Prabhu R. Nott ◽  
K. Kesava Rao ◽  
L. Srinivasa Mohan

ABSTRACTThe slow flow of granular materials is often marked by the existence of narrow shear layers, adjacent to large regions that suffer little or no deformation. This behaviour, in the regime where shear stress is generated primarily by the frictional interactions between grains, has so far eluded theoretical description. In this paper, we present a rigid-plastic frictional Cosserat model that captures thin shear layers by incorporating a microscopic length scale. We treat the granular medium as a Cosserat continuum, which allows the existence of localised couple stresses and, therefore, the possibility of an asymmetric stress tensor. In addition, the local rotation is an independent field variable and is not necessarily equal to the vorticity. The angular momentum balance, which is implicitly satisfied for a classical continuum, must now be solved in conjunction with the linear momentum balances. We extend the critical state model, used in soil plasticity, for a Cosserat continuum and obtain predictions for flow in plane and cylindrical Couette devices. The velocity profile predicted by our model is in qualitative agreement with available experimental data. In addition, our model can predict scaling laws for the shear layer thickness as a function of the Couette gap, which must be verified in future experiments. Most significantly, our model can determine the velocity field in viscometric flows, which classical plasticity-based model cannot.


Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


AIAA Journal ◽  
1997 ◽  
Vol 35 ◽  
pp. 1669-1671
Author(s):  
A. Tabiei ◽  
J. Sun ◽  
G. J. Simitses

Sign in / Sign up

Export Citation Format

Share Document