SYN flood defense in programmable data planes
D Scholz, S Gallenmüller, H Stubbe… - … of the 3rd P4 Workshop in …, 2020 - dl.acm.org
The SYN flood attack is a common attack strategy as part of Distributed Denial-of-Service,
which steadily becomes more frequent and of higher volume. To defend against SYN floods …
which steadily becomes more frequent and of higher volume. To defend against SYN floods …
[PDF][PDF] Research Article An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET)
M Chhabra, BB Gupta - Research Journal of Applied …, 2014 - pdfs.semanticscholar.org
The purpose of this study is to understand the flaws of existing solutions to combat the DDoS
attack and a novel scheme is being provided with its validation to reduce the effect of DDoS …
attack and a novel scheme is being provided with its validation to reduce the effect of DDoS …
Efficient syn spoofing detection and mitigation scheme for ddos attack
L Kavisankar, C Chellappan… - … conference on recent …, 2017 - ieeexplore.ieee.org
Protection of critical server from cyber attacks is vital, especially in the case of active attacks
like Distributed Denial of Service (DDoS). Seamless services are provided by the constant …
like Distributed Denial of Service (DDoS). Seamless services are provided by the constant …
Low power current mode receiver with inductive input impedance
In this paper we show that current mode signaling system with receivers using inductive
input impedance can provide a low power solution to high speed data transmission over …
input impedance can provide a low power solution to high speed data transmission over …
Against spoofing attacks in network layer
L Kavisankar, C Chellappan… - … Security Breaches and …, 2016 - igi-global.com
In the context of network security, a spoofing attack is a condition in which one person or a
program successfully masquerades as another. This is done by providing counterfeit data …
program successfully masquerades as another. This is done by providing counterfeit data …
A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets
L Kavisankar, C Chellappan, P Sivasankar… - KSII Transactions on …, 2014 - koreascience.kr
Abstract DDoS (Distributed Denial of Service) has been a continuous threat to the cyber
world with the growth in cyber technology. This technical evolution has given rise to a …
world with the growth in cyber technology. This technical evolution has given rise to a …
Enhancing The Impregnability of Linux Servers
RKG Rao, SR Prasad, PA Sastri… - International Journal of …, 2014 - search.proquest.com
Worldwide IT industry is experiencing a rapid shift towards Service Oriented Architecture. As
a response to the current trend, all the IT firms are adopting business models such as cloud …
a response to the current trend, all the IT firms are adopting business models such as cloud …
Neutralizing DoS Attacks on Linux Servers
GRK Rao, AP Sastri - … (NetCom2013) Proceedings of the Fifth International …, 2014 - Springer
Worldwide IT industry is shifting towards Service Oriented Architecture at a fast pace. To
meet this emerging scenario, most of the organizations are adopting business models such …
meet this emerging scenario, most of the organizations are adopting business models such …
Enhanced efficient SYN spoofing detection and mitigation scheme for DDoS attacks
L Kavisankar, C Chellappan… - … Journal of Internet …, 2018 - inderscienceonline.com
Protection of critical server from cyber attacks is vital, especially in the case of active attacks
like distributed denial of service (DDoS). Generally, denial of service (DoS) is an action that …
like distributed denial of service (DDoS). Generally, denial of service (DoS) is an action that …
[PDF][PDF] DETECTING AND PREVENTING ASSAULTS ON NETWORK TRANSPORT FOR LINUX SYSTEMS
GRK Rao - Citeseer
Network Security is an area of major concern to any organization. This paper focuses on
various types of attacks on the network & transport layers and presents samples of scripts …
various types of attacks on the network & transport layers and presents samples of scripts …