[go: up one dir, main page]

Hudaib et al., 2014 - Google Patents

DNS advanced attacks and analysis

Hudaib et al., 2014

View PDF
Document ID
13630343935060388302
Author
Hudaib A
Hudaib E
Publication year
Publication venue
International Journal of Computer Science and Security (IJCSS)

External Links

Snippet

Nowadays DNS is used to load balance, failover, and geographically redirect connections. DNS has become so pervasive it is hard to identify a modern TCP/IP connection that does not use DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
US10084791B2 (en) Evaluating a questionable network communication
Sinha et al. Information Security threats and attacks with conceivable counteraction
US10542006B2 (en) Network security based on redirection of questionable network access
US10382436B2 (en) Network security based on device identifiers and network addresses
US7984493B2 (en) DNS based enforcement for confinement and detection of network malicious activities
US10157280B2 (en) System and method for identifying security breach attempts of a website
US20160248795A1 (en) Evaluating a questionable network communication
Gilad et al. Off-Path Attacking the Web.
Hudaib et al. DNS advanced attacks and analysis
Livingood et al. Recommendations for the Remediation of Bots in ISP Networks
Noborio et al. A feasible motion-planning algorithm for a mobile robot based on a quadtree representation
US12003537B2 (en) Mitigating phishing attempts
Shulman et al. Towards forensic analysis of attacks with DNSSEC
Trabelsi et al. Preventing ARP attacks using a fuzzy-based stateful ARP cache
Nagesh et al. A survey on denial of service attacks and preclusions
Ghorbani et al. Network attacks
Tiwari et al. Alternative (ab) uses for {HTTP} Alternative Services
Shulman et al. DNSSEC for cyber forensics
Marchetti et al. Cyber attacks on financial critical infrastructures
Prabadevi et al. Lattice structural analysis on sniffing to denial of service attacks
Whyte et al. Addressing malicious smtp-based mass-mailing activity within an enterprise network
Karamagi Comptia Security+ Practice Exams
Verwoerd et al. Security architecture testing using IDS—a case study
Shulman Implications of vulnerable internet infrastructure
Wang et al. The botnet problem