Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Information Security

Implementation And Comparison Of Denial Of Service Attack Techniques, Khaled M. Elleithy, Drazen Blagovic, Wang K. Cheng, Paul Sideleau Oct 2004

Implementation And Comparison Of Denial Of Service Attack Techniques, Khaled M. Elleithy, Drazen Blagovic, Wang K. Cheng, Paul Sideleau

School of Computer Science & Engineering Faculty Publications

A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid of spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN …


A Novel Distributed Denial-Of-Service Detection Algorithm, Brett Tsudama Jun 2004

A Novel Distributed Denial-Of-Service Detection Algorithm, Brett Tsudama

Master's Theses

The applicability of implementing Ratio-based SYN Flood Detection (RSD) on a network processor is explored, and initial results are presented.


A Secure Client/Server Java Application Programming Interface, Tawfik Lachheb Jan 2004

A Secure Client/Server Java Application Programming Interface, Tawfik Lachheb

Theses Digitization Project

The purpose of this project is to develop a generic Java Application Programming Interface (API) that would be used to provide security and user privacy to functions such as data transfer, key management, digital signature, etc.