Hudaib et al., 2014 - Google Patents
DNS advanced attacks and analysisHudaib et al., 2014
View PDF- Document ID
- 13630343935060388302
- Author
- Hudaib A
- Hudaib E
- Publication year
- Publication venue
- International Journal of Computer Science and Security (IJCSS)
External Links
Snippet
Nowadays DNS is used to load balance, failover, and geographically redirect connections. DNS has become so pervasive it is hard to identify a modern TCP/IP connection that does not use DNS in some way. Unfortunately, due to the reliability built into the fundamental RFC …
- 238000004458 analytical method 0 title description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10084791B2 (en) | Evaluating a questionable network communication | |
Sinha et al. | Information Security threats and attacks with conceivable counteraction | |
US10542006B2 (en) | Network security based on redirection of questionable network access | |
US10382436B2 (en) | Network security based on device identifiers and network addresses | |
US7984493B2 (en) | DNS based enforcement for confinement and detection of network malicious activities | |
US10157280B2 (en) | System and method for identifying security breach attempts of a website | |
US20160248795A1 (en) | Evaluating a questionable network communication | |
Gilad et al. | Off-Path Attacking the Web. | |
Hudaib et al. | DNS advanced attacks and analysis | |
Livingood et al. | Recommendations for the Remediation of Bots in ISP Networks | |
Noborio et al. | A feasible motion-planning algorithm for a mobile robot based on a quadtree representation | |
US12003537B2 (en) | Mitigating phishing attempts | |
Shulman et al. | Towards forensic analysis of attacks with DNSSEC | |
Trabelsi et al. | Preventing ARP attacks using a fuzzy-based stateful ARP cache | |
Nagesh et al. | A survey on denial of service attacks and preclusions | |
Ghorbani et al. | Network attacks | |
Tiwari et al. | Alternative (ab) uses for {HTTP} Alternative Services | |
Shulman et al. | DNSSEC for cyber forensics | |
Marchetti et al. | Cyber attacks on financial critical infrastructures | |
Prabadevi et al. | Lattice structural analysis on sniffing to denial of service attacks | |
Whyte et al. | Addressing malicious smtp-based mass-mailing activity within an enterprise network | |
Karamagi | Comptia Security+ Practice Exams | |
Verwoerd et al. | Security architecture testing using IDS—a case study | |
Shulman | Implications of vulnerable internet infrastructure | |
Wang et al. | The botnet problem |