Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,969,267 papers from all fields of science
Search
Sign In
Create Free Account
Ping of death
Known as:
Pings-of-Death
A ping of death is a type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer. A correctly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Attack (computing)
Buffer overflow
Byte
Code injection
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Waqar Ali
,
J. Sang
,
Hamad Naeem
,
Rashid Naeem
,
Ali Raza
6th IEEE International Conference on Software…
2015
Corpus ID: 33332572
DoS (Denial of Service) attack forces a cloud network node to handle few unauthorized access that employ unwanted computing cycle…
Expand
2014
2014
IDENTIFICATION OF CORRUPTED MACHINES IN THE NETWORK AND ITS DEFENSE MECHANISM
R. Goswami
,
D. Goswami
2014
Corpus ID: 55905507
In present days, the number of attacks in computer networks are constantly increasing due to the lack of proper authentication of…
Expand
2014
2014
Detection and Mitigation of DDOS Attacks ByCircular IPS Protection Network
S. Priyanka
,
S. Hussain
2014
Corpus ID: 23185201
One of the major threat in most of the networks is the distributed denial of service and its mitigation is another important…
Expand
2012
2012
NetSHIELD: Countermeasure Tool for Network Layer Attacks
P. Korgaonkar
,
A. Patil
,
Nilesh R. Khochare
2012
Corpus ID: 58104827
In TCP/IP Reference model, Network layer & Transport layer plays an important role in order to send any Information via network…
Expand
2012
2012
A PAXOS based State Machine Replication System for Anomaly Detection
M. Thakur
,
S. Sanyal
arXiv.org
2012
Corpus ID: 7172180
A number of systems in recent times suffer from attacks like DDoS and Ping of Death. Such attacks result in loss of critical…
Expand
2011
2011
SISTEM PENDETEKSIAN PENYUSUPAN JARINGAN KOMPUTER DENGAN ACTIVE RESPONSE MENGGUNAKAN METODE HYBRID INTRUSION DETECTION, SIGNATURES DAN ANOMALY DETECTION
Novriyanto Novriyanto
,
Haris Simare Mare
,
Wenni Syafitri
2011
Corpus ID: 114733672
The progress of internet technology increase the need of security data. The progress of tools which have intrusion ability, also…
Expand
2011
2011
Denial of Service ( DoS ) Attack Detection by Using Fuzzy Logic over Network Flows
S. F. Tabatabaei
,
M. Salleh
,
M. Abbasy
,
Mohammadreza Najaftorkaman
2011
Corpus ID: 14425156
Intrusion Detection System (IDS) is the tool that is able to detect occurrences of intrusion at host, network, as well as…
Expand
2009
2009
Modelling of Conflict Controlled Networks
O. Ignatenko
2009
Corpus ID: 14529920
Abstract : Game theoretical techniques have recently become prevalent in many engineering applications, notably in communications…
Expand
2007
2007
SVision: A novel visual network-anomaly identification technique
Iosif-Viorel Onut
,
A. Ghorbani
Computers & security
2007
Corpus ID: 15542927
2007
2007
Svision: Visual Identification of Scanning and Denial of Service Attacks
Iosif-Viorel Onut
,
Bin Zhu
,
A. Ghorbani
2007
Corpus ID: 4515581
— We propose a novel graphical technique (SVision) for intrusion detection, which pictures the network as a community of hosts…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required