Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 212,385,297 papers from all fields of science
Search
Sign In
Create Free Account
Denial-of-service attack
Known as:
Phlashing
, Dos attack
, Reflector
Expand
In computing, a denial-of-service (DoS) attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
4chan
Anti-worm
Application delivery network
Application security
Expand
Broader (1)
Cyberwarfare
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
S. Zargar
,
J. Joshi
,
D. Tipper
IEEE Communications Surveys and Tutorials
2013
Corpus ID: 206584087
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding…
Expand
Review
2008
Review
2008
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
D. Raymond
,
S. Midkiff
IEEE pervasive computing
2008
Corpus ID: 11941713
This survey of denial-of-service threats and countermeasures considers wireless sensor platforms' resource constraints as well as…
Expand
Review
2006
Review
2006
Denial-of-service attack-detection techniques
G. Carl
,
G. Kesidis
,
R. Brooks
,
S. Rai
IEEE Internet Computing
2006
Corpus ID: 206463507
Denial-of-service (DoS) detection techniques - such as activity profiling, change-point detection, and wavelet-based signal…
Expand
Highly Cited
2003
Highly Cited
2003
A framework for classifying denial of service attacks
Alefiya Hussain
,
J. Heidemann
,
C. Papadopoulos
Conference on Applications, Technologies…
2003
Corpus ID: 561371
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process…
Expand
Highly Cited
2003
Highly Cited
2003
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
J. Bellardo
,
S. Savage
USENIX Security Symposium
2003
Corpus ID: 1926762
The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and…
Expand
Highly Cited
2002
Highly Cited
2002
Denial of Service in Sensor Networks
A. Wood
,
J. Stankovic
Computer
2002
Corpus ID: 206446574
Sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments, helping to…
Expand
Highly Cited
2001
Highly Cited
2001
Inferring Internet denial-of-service activity
D. Moore
,
G. Voelker
,
S. Savage
TOCS
2001
Corpus ID: 3985397
In this article, we seek to address a simple question: “How prevalent are denial-of-service attacks in the Internet?” Our…
Expand
Highly Cited
2000
Highly Cited
2000
Distributed denial of service attacks
Felix Lau
,
S. Rubin
,
Michael H. Smith
,
L. Trajković
Smc conference proceedings. ieee international…
2000
Corpus ID: 7504559
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed…
Expand
Highly Cited
1998
Highly Cited
1998
Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing
P. Ferguson
,
D. Senie
Request for Comments
1998
Corpus ID: 33726569
Recent occurrences of various Denial of Service (DoS) attacks which have employed forged source addresses have proven to be a…
Expand
Highly Cited
1997
Highly Cited
1997
Analysis of a denial of service attack on TCP
C. Schuba
,
Ivan Krsul
,
M. Kuhn
,
E. Spafford
,
A. Sundaram
,
D. Zamboni
Proceedings. IEEE Symposium on Security and…
1997
Corpus ID: 2413179
The paper analyzes a network based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE