A Survey on Denial of Service Attacks and Preclusions

2017 ◽  
Vol 11 (4) ◽  
pp. 1-15 ◽  
Author(s):  
Nagesh K. ◽  
Sumathy R. ◽  
Devakumar P. ◽  
Sathiyamurthy K.

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.

Author(s):  
Nagesh K. ◽  
Sumathy R. ◽  
Devakumar P. ◽  
Sathiyamurthy K.

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.


Author(s):  
Mahesh K. Joshi ◽  
J.R. Klein

New technologies like artificial intelligence, robotics, machine intelligence, and the Internet of Things are seeing repetitive tasks move away from humans to machines. Humans cannot become machines, but machines can become more human-like. The traditional model of educating workers for the workforce is fast becoming irrelevant. There is a massive need for the retooling of human workers. Humans need to be trained to remain focused in a society which is constantly getting bombarded with information. The two basic elements of physical and mental capacity are slowly being taken over by machines and artificial intelligence. This changes the fundamental role of the global workforce.


2013 ◽  
Vol 17 (4) ◽  
pp. 483-500 ◽  
Author(s):  
Teresa Correa ◽  
Joseph D Straubhaar ◽  
Wenhong Chen ◽  
Jeremiah Spence

Author(s):  
Inderjeet Singh Sodhi

This chapter highlights the constant increase in the number of attacks on computer network systems, which has pushed governments, researchers, and experts to devise better security policies and strategies. However, the rapid growth of systems, components, and services offered has increased the difficulty of administering them. In many organizations in developed and developing countries, more emphasis is being given on use of Automatic Computing for proper network security. The chapter clarifies how various projects and tools could be relevant for network security. The chapter provides insights about what steps have been taken for network security in a developing country like India. It looks into various strategies adopted for communication data and network security in India. It emphasizes that, with increasing demand for basic/citizen services over the Internet, it has become important to protect data and ensure efficient backup and data recovery. The chapter proposes a need for better and effective policy and strategy for communication data and network security to make the government citizen-oriented in developing countries.


Author(s):  
Sobana Sikkanan ◽  
Kasthuri M.

The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.


2011 ◽  
Vol 22 (05) ◽  
pp. 1073-1098
Author(s):  
SHLOMI DOLEV ◽  
YUVAL ELOVICI ◽  
ALEX KESSELMAN ◽  
POLINA ZILBERMAN

As more and more services are provided by servers via the Internet, Denial-of-Service (DoS) attacks pose an increasing threat to the Internet community. A DoS attack overloads the target server with a large volume of adverse requests, thereby rendering the server unavailable to "well-behaved" users. In this paper, we propose two algorithms that allow attack targets to dynamically filter their incoming traffic based on a distributed policy. The proposed algorithms defend the target against DoS and distributed DoS (DDoS) attacks and simultaneously ensure that it continues to serve "well-behaved" users. In a nutshell, a target can define a filtering policy which consists of a set of traffic classification rules and the corresponding amounts of traffic for each rule. A filtering algorithm is enforced by the ISP's routers when a target is being overloaded with traffic. The goal is to maximize the amount of filtered traffic forwarded to the target, according to the filtering policy, from the ISP. The first proposed algorithm is a collaborative algorithm which computes and delivers to the target the best possible traffic mix in polynomial time. The second algorithm is a distributed non-collaborative algorithm for which we prove a lower bound on the worst-case performance.


2016 ◽  
Vol 14 (1) ◽  
pp. 4-15 ◽  
Author(s):  
Mirjam Jessica Curno

Purpose – The aim of this paper is to lay out some of the more complex issues arising in the area of publication ethics. The impact of electronic publishing and electronic information is a main focus of the paper. Design/methodology/approach – The paper draws in particular upon the work of the Committee on Publication Ethics including illustrative cases discussed at the forum, guidelines and discussion documents. Findings – Three areas are highlighted to stimulate discussion around challenges of publication ethics in the digital era. These are the role of the internet in facilitating misconduct, the issue of confidentiality in publishing and how incentives in research assessments drive author behavior. Originality/value – The paper brings together a variety of issues discussed under the broader umbrella of electronic information and new technologies in publishing.


Comunicar ◽  
2006 ◽  
Vol 14 (27) ◽  
pp. 225-231
Author(s):  
Antonio García-Guzmán

In this paper some contributions that new technologies have made to the literacy world are analyzed and special emphasis is given to show how new technologies can facilita te the access and the process of learning literacy and literature to people who have some special education needs. This paper will focus on the benefits of computer science and particulary on the role of the Internet to make literature available to everybody. En este texto se analizan algunas de las aportaciones que las tecnologías han introducido en el mundo literario, y sobretodo se hace especial hincapié en mostrar cómo las nuevas tecnologías pueden facilitar el acceso y aprendizaje de la lengua y la literatura a aquellas personas que poseen alguna necesidad educativa especial. De este modo, este estudio se centra en las posibilidades de la informática y más concretamente de Internet, para hacer más accesible la literatura a todos los colectivos.


2020 ◽  
Vol 21 (1) ◽  
pp. 1-2
Author(s):  
Swaminathan JN ◽  
Gopi Ram ◽  
Sureka Lanka

The evolution of Internet of Things has given way to a Smart World where there is an improved integration of devices, systems and processes in humans through all pervasive connectivity. Anytime, anywhere connection and transaction is the motto of the Internet of things which brings comfort to the users and sweeps the problem of physical boundary out of the way. Once it has come into the purview of developers, new areas have been identified and new applications have been introduced. Small wearables which can track your health to big automated vehicles which can move from one place to another self navigating without human intervention are the order of the day. This has also brought into existence a new technology called cloud, since with IoT comes a large number of devices connected to the internet continuously pumping data into the cloud for storage and processing. Another area benefited from the evolution of IoT is the wireless and wired connectivity through a wide range of connectivity standards. As with any technology, it has also created a lot of concerns regarding the security, privacy and ethics.   Data protection issues created by new technologies are a threat which has been recognized by developers, public and also the governing body long back. The complexity of the system arises because of the various sensors and technologies which clearly tell the pattern of the activities of the individual as well an organization making us threat prone. Moreover, the volume of the data in the cloud makes it too difficult to recognize the privacy requirement of the data or to segregate open data from private data. Data analytics is another technology which supposedly increases the opportunity of increasing business by studying this private data collected from IoT and exploring ways to monetize them. It also helps the individual by recognizing their priorities and narrowing their search. But the data collected are real world data and aggregation of this data in the cloud is an open invitation to the hackers to study about the behaviors of the individuals.   The special issues of Scalable Computing has attract related to the Role of Scalable Computing and Data Analytics in Evolution of Internet of Things has attracted 28 submissions from which were selected 12.    


2021 ◽  
pp. 46-80
Author(s):  
Jirka Konietzny ◽  
Albert Caruana

Recreational gambling has become an accepted pursuit, and the advent of the Internet has rendered online gambling ubiquitous. However, the resultant rapid growth in online recreational gambling is not matched by an understanding of the drivers of customers’ intentions to gamble online. While this is potentially a fascinating aspect of consumer behavior, marketing scholars have shied away from giving online gambling much attention. This research seeks a better understanding of the drivers of recreational online gambling intentions among customers by applying the latest version of the Unified Theory of Acceptance and Technology—UTAUT 2, to customers in an online gambling context. It also proposes additional hypotheses that account for the role of anticipated enjoyment and perceived fairness. Data are collected from 593 casino customers of an online gambling firm and analyzed using PLS-SEM via Smart PLS. Results show that perceived fairness and anticipated enjoyment are significant drivers of online gambling intention, with perceived fairness being fully mediated by effort expectancy, anticipated enjoyment, and social influence. Shorn of drivers and moderators that are not significant, an online gambling intention model is proposed. Theoretical and managerial implications are discussed, limitations are noted, and areas for further research are suggested.


Sign in / Sign up

Export Citation Format

Share Document