Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,661,415 papers from all fields of science
Search
Sign In
Create Free Account
Trinoo
The trinoo or trin00 is a set of computer programs to conduct a DDoS attack. It is believed that trinoo networks have been set up on thousands of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Botnet
Denial-of-service attack
HOIC
LOIC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Novel DDoS Floods Detection and Testing Approaches for Network Traffic based on Linux Techniques
Muhammad Tahir
,
Mingchu Li
,
Naeem Ayoub
,
Usman Shehzaib
,
A. A. Wagan
2018
Corpus ID: 3694461
In Today’s Digital World, the continuous interruption of users has affected Web Servers (WSVRs), through Distributed Denial-of…
Expand
2009
2009
The Conflicts Facing Those Responding to Cyberconflict
D. Dittrich
Login: The Usenix Magazine
2009
Corpus ID: 14042713
Dave Dittrich holds an appointment as an affiliate principal scientist with the Applied Physics Lab at the University of Washing…
Expand
2007
2007
Lightweight Detection of DoS Attacks
S. Pukkawanna
,
V. Visoottiviseth
,
P. Pongpaibool
ICON
2007
Corpus ID: 18040265
Denial of service (DoS) attacks have continued to evolve and impact availability of the Internet infrastructure. Many researchers…
Expand
2007
2007
Simulation and Analysis of DDoS in Active Defense Environment
Zhongwen Li
,
Yang Xiang
,
Dongsheng He
International Conference on Computational…
2007
Corpus ID: 34961845
Currently there is very few data that can describe the whole profile of a DDoS attack. In this paper, the active DDoS defense…
Expand
2005
2005
Analyse spectrale d'outils classiques de DDoS
L. Gallon
,
J. Aussibal
2005
Corpus ID: 171702014
Resume. L’objectif de ce papier est d’analyser les variations de trafic generees par un outil de DDoS classique : TFN2k. La…
Expand
Review
2004
Review
2004
Developments in DoS Research and Mitigating Technologies
V. Bocan
2004
Corpus ID: 15447208
This paper is a survey on the problem of denial of service attacks and the proposed ways to defend against them. Of particular…
Expand
2004
2004
Diadem Firewall Deliverable D3: Attack Requirements Specification D3 -attack Requirements Specification the Diadem Firewall Consists Of: Partner Short Name Country 1 Acronyms Acc Aggregation and…
France Télécom
,
Ft France
,
+53 authors
G. Weaver
2004
Corpus ID: 14711312
Executive summary This document provides a state of the art of existing DoS detection schemes. It includes a taxonomy of existing…
Expand
2002
2002
A Genealogical Approach to Analyzing Post-Mortem Denial of Service Attacks
Gregory W. Rice
,
J. Davis
2002
Corpus ID: 6830046
Availability requires that computer systems remain functioning as expected without loss of resources to legitimate users. The…
Expand
2001
2001
Are You Scared Yet? Are You Scared Yet? Are You Scared Yet? Are You Scared Yet? Are You Scared Yet? Hackers Digest Issue 2 Fall 2001 Hacker's Digest Focus Guidelines for C Source Code Auditing…
---Kevin Poulsen
,
David Larochelle
,
David Evans
2001
Corpus ID: 2608173
Basics About Attack Recognition How does one recognize an attack? Not just a Denial of Service attack, but any attack? Before we…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required