Skip to search formSkip to main contentSkip to account menu

Denial-of-service attack

Known as: Phlashing, Dos attack, Reflector 
In computing, a denial-of-service (DoS) attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding… 
Review
2008
Review
2008
This survey of denial-of-service threats and countermeasures considers wireless sensor platforms' resource constraints as well as… 
Review
2006
Review
2006
Denial-of-service (DoS) detection techniques - such as activity profiling, change-point detection, and wavelet-based signal… 
Highly Cited
2003
Highly Cited
2003
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process… 
Highly Cited
2003
Highly Cited
2003
The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and… 
Highly Cited
2002
Highly Cited
2002
Sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments, helping to… 
Highly Cited
2001
Highly Cited
2001
In this article, we seek to address a simple question: “How prevalent are denial-of-service attacks in the Internet?” Our… 
Highly Cited
2000
Highly Cited
2000
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed… 
Highly Cited
1998
Highly Cited
1998
Recent occurrences of various Denial of Service (DoS) attacks which have employed forged source addresses have proven to be a… 
Highly Cited
1997
Highly Cited
1997
The paper analyzes a network based denial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN…