A note on denial-of-service in operating systems
IEEE Transactions on Software Engineering
Computer Networks
Adjusted Probabilistic Packet Marking for IP Traceback
NETWORKING '02 Proceedings of the Second International IFIP-TC6 Networking Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications
A framework for classifying denial of service attacks
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Addressing reality: an architectural response to real-world demands on the evolving Internet
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
A review of information security issues and respective research contributions
ACM SIGMIS Database
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
Information sharing for distributed intrusion detection systems
Journal of Network and Computer Applications
Conditional Random Fields for Intrusion Detection
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01
Attacking confidentiality: an agent based approach
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
Since the day the Internet was made public, it has evolved as one of the most convenient, easily available and low cost media that help us to get connected to a vast variety of data and information. Its vast size and the ease of access of resources have made the Internet one of the most popular and widely used media for information exchange. However, this does not mean that it is free from any problems. Ensuring continuity of services and security of data is one of the most critical issues that must be resolved before the real power of the Internet can be harnessed. With more and more attacks emerging on a daily basis, it becomes necessary to analyze their root causes rather than to try and eliminate the attacks individually. Hence, in this paper we identify various factors responsible for the current state of insecurity and discuss the main categories of threats which span over the possible attacks that persist over the Internet. We also discuss the major limitations and challenges that need to be resolved to provide a better and a safe Internet.