Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,218,479 papers from all fields of science
Search
Sign In
Create Free Account
Denial-of-service attack
Known as:
Phlashing
, Dos attack
, Reflector
Expand
In computing, a denial-of-service (DoS) attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
4chan
Anti-worm
Application delivery network
Application security
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Bad-token: denial of service attacks on WPA3
K. Lounis
,
Mohammad Zulkernine
International Conference on Security of…
2019
Corpus ID: 208277807
WPA3 (Wi-Fi Protected Access 3) is a certification that augments its predecessor WPA2 with protection mechanisms, such as…
Expand
Highly Cited
2016
Highly Cited
2016
Detecting Distributed Denial of Service Attacks Using Data Mining Techniques
M. Alkasassbeh
,
Ghazi Al-Naymat
,
Ahmad Hassanat
,
Mohammad Almseidin
2016
Corpus ID: 44576610
Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. . The…
Expand
Review
2010
Review
2010
Protection Against Denial of Service Attacks: A Survey
G. Loukas
,
Gülay Öke Günel
Computer/law journal
2010
Corpus ID: 825893
Denial of service (DoS) is a prevalent threat in today's networks because DoS attacks are easy to launch, while defending a…
Expand
Highly Cited
2010
Highly Cited
2010
Lightweight DDoS flooding attack detection using NOX/OpenFlow
Rodrigo Braga
,
E. Mota
,
A. Passito
IEEE Local Computer Network Conference
2010
Corpus ID: 1263511
Distributed denial-of-service (DDoS) attacks became one of the main Internet security problems over the last decade, threatening…
Expand
Highly Cited
2009
Highly Cited
2009
Politically Motivated Denial of Service Attacks
Jose Nazario
,
C. Czosseck
,
Kenneth Geers
2009
Corpus ID: 167493074
Cyberwarfare has been waged for well over a decade, utilizing methods such as website defacement, data leakage, and distributed…
Expand
Highly Cited
2003
Highly Cited
2003
Low-rate TCP-targeted denial of service attacks and counter strategies
A. Kuzmanovic
,
E. Knightly
IEEE/ACM Transactions on Networking
2003
Corpus ID: 3205872
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP's…
Expand
Highly Cited
2002
Highly Cited
2002
Honeypots for distributed denial-of-service attacks
Nathalie Weiler
Proceedings. Eleventh IEEE International…
2002
Corpus ID: 13248922
Distributed denial-of-service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have…
Expand
Highly Cited
2001
Highly Cited
2001
An analysis of using reflectors for distributed denial-of-service attacks
V. Paxson
CCRV
2001
Corpus ID: 10353043
Attackers can render distributed denial-of-service attacks more difficult to defend against by bouncing their flooding traffic…
Expand
Highly Cited
2001
Highly Cited
2001
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
Heejo Lee
,
Kihong Park
Proceedings IEEE INFOCOM . Conference on Computer…
2001
Corpus ID: 4505237
Effective mitigation of denial of service (DoS) attack is a pressing problem on the Internet. In many instances, DoS attacks can…
Expand
Highly Cited
2000
Highly Cited
2000
Defeating distributed denial of service attacks
Xianjun Geng
,
Andrew Whinston
2000
Corpus ID: 15777154
Security experts generally acknowledge that the long-term solution to distributed denial of service attacks is to increase the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE