Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,724,803 papers from all fields of science
Search
Sign In
Create Free Account
Ping of death
Known as:
Pings-of-Death
A ping of death is a type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer. A correctly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Attack (computing)
Buffer overflow
Byte
Code injection
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An intrusion detection system against UDP flood attack and ping of death attack (DDOS) in MANET
A. Acharya
,
K. Arpitha
,
B. Kumar
2016
Corpus ID: 56720709
- DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death…
Expand
2014
2014
IDENTIFICATION OF CORRUPTED MACHINES IN THE NETWORK AND ITS DEFENSE MECHANISM
R. Goswami
,
D. Goswami
2014
Corpus ID: 55905507
In present days, the number of attacks in computer networks are constantly increasing due to the lack of proper authentication of…
Expand
2014
2014
Detection and Mitigation of DDOS Attacks ByCircular IPS Protection Network
S. Priyanka
,
S. Hussain
2014
Corpus ID: 23185201
One of the major threat in most of the networks is the distributed denial of service and its mitigation is another important…
Expand
2012
2012
A PAXOS based State Machine Replication System for Anomaly Detection
M. Thakur
,
S. Sanyal
arXiv.org
2012
Corpus ID: 7172180
A number of systems in recent times suffer from attacks like DDoS and Ping of Death. Such attacks result in loss of critical…
Expand
2012
2012
Real Time and Offline Network Intrusion Detection using Improved Decision Tree Algorithm
Sunil Kumar
,
Dianhong Wang
,
+13 authors
Dao-Qiang Zhang
2012
Corpus ID: 358523
Data mining has been used extensively and broadly by several network organizations. Classification based algorithms provide a…
Expand
2011
2011
SISTEM PENDETEKSIAN PENYUSUPAN JARINGAN KOMPUTER DENGAN ACTIVE RESPONSE MENGGUNAKAN METODE HYBRID INTRUSION DETECTION, SIGNATURES DAN ANOMALY DETECTION
Novriyanto Novriyanto
,
Haris Simare Mare
,
Wenni Syafitri
2011
Corpus ID: 114733672
The progress of internet technology increase the need of security data. The progress of tools which have intrusion ability, also…
Expand
2011
2011
Denial of Service ( DoS ) Attack Detection by Using Fuzzy Logic over Network Flows
S. F. Tabatabaei
,
M. Salleh
,
M. Abbasy
,
Mohammadreza Najaftorkaman
2011
Corpus ID: 14425156
Intrusion Detection System (IDS) is the tool that is able to detect occurrences of intrusion at host, network, as well as…
Expand
2009
2009
Modelling of Conflict Controlled Networks
O. Ignatenko
2009
Corpus ID: 14529920
Abstract : Game theoretical techniques have recently become prevalent in many engineering applications, notably in communications…
Expand
2007
2007
SVision: A novel visual network-anomaly identification technique
Iosif-Viorel Onut
,
A. Ghorbani
Computers & security
2007
Corpus ID: 15542927
2007
2007
Svision: Visual Identification of Scanning and Denial of Service Attacks
Iosif-Viorel Onut
,
Bin Zhu
,
A. Ghorbani
2007
Corpus ID: 4515581
— We propose a novel graphical technique (SVision) for intrusion detection, which pictures the network as a community of hosts…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE