Mohammed Alenezi

  • Citations Per Year
Learn More
In the last decade, denial of service (DoS) becomes one of the most significant security threats in the Internet. The existing limitations of the Internet protocols and the available tools make DoS attack easy to launch and effective in damage. There are many different forms of DoS attack and size of attack could be varying from simple single attacker to a(More)
Denial of service (DoS) is a significant security challenge in the Internet. Identifying the attackers so that their attack traffic can be blocked at source is one strategy that can be used to mitigate DoS attacks. However, determining the source can be difficult due to the inherent connectionless nature of IP. Traceback using various marking schemes that(More)
Denial of service (DoS) is a significant security threat in open networks such as the Internet. The existing limitations of the Internet protocols and the common availability tools make a DoS attack both effective and easy to launch. There are many different forms of DoS attack and the attack size could be amplified from a single attacker to a distributed(More)
In cyberworld, resource accessibility has a key part in digital security alongside confidentiality and trustworthiness. Distributed Denial of Service (DDoS) attack has turned into an intriguing issue to the availability of assets in computer networks. In this paper, DDoS attacks at different layers of TCP/IP protocol are scrutinized and comparison of(More)
OBJECTIVE To evaluate the effects of physiologic doses of levothyroxine replacement on the lipoprotein profile in patients with subclinical hypothyroidism (SCH). METHODS In a prospective, double-blind, placebo-controlled study, we enrolled 120 patients--mostly, but not exclusively, premenopausal women--with SCH. Patients were randomly assigned to either a(More)
Denial of Service (DoS) is a significant security threat in the internet. The availability of different forms of DoS makes devising solutions hard. The attackers could hide their identity behind legitimate users or spoof the source address of the packets. Therefore, differentiating between legitimate packets and attacker packets becomes difficult. The(More)
Denial of service (DoS) is a significant security threat in open networks such as the Internet. IP traceback is one important tool proposed as part of DoS mitigation. Many techniques have been proposed to traceback the attacker locally, within a single domain. Fewer techniques have been proposed to traceback the origin of attack through a number of(More)
Denial of service is a common attack in the Internet which causes significant problems for both users and service providers. Distributed attack sources can be used to enlarge the attack in case of distributed denial of service (DDoS). Defending against DoS/DDoS attacks generally involves 3 different phases: prevention, detection and response. Detection, the(More)
  • 1