2011
DOI: 10.1002/sec.219
|View full text |Cite
|
Sign up to set email alerts
|

Impact of denial of service solutions on network quality of service

Abstract: Abstract-The Internet has become a universal communication network tool. It has evolved from a platform that supports best-effort traffic to one that now carries different traffic types including those involving continuous media with Quality of Service (QoS) requirements. As more services are delivered over the Internet, we face increasing risk to their availability given that malicious attacks on those Internet services continue to increase. Several networks have witnessed Denial of Service (DoS) and Distribu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 68 publications
0
5
0
Order By: Relevance
“…If this vulnerability is triggered remotely, it will lead to a denial of service (DoS) attack. As described in , DoS attacks are major threats to network quality of service. In fact, the manufacturer has not fixed these vulnerabilities, so we do not publish the manufacturer and model of the router, while the vulnerabilities have been confirmed by the manufacturer.…”
Section: Methodsmentioning
confidence: 99%
“…If this vulnerability is triggered remotely, it will lead to a denial of service (DoS) attack. As described in , DoS attacks are major threats to network quality of service. In fact, the manufacturer has not fixed these vulnerabilities, so we do not publish the manufacturer and model of the router, while the vulnerabilities have been confirmed by the manufacturer.…”
Section: Methodsmentioning
confidence: 99%
“…When we use regular cryptographic methods, an intruder can intentionally provide delay or DoS (Denial of Service) attack in order to degrade the QoS (Quality of Service) [38]. In our case, it is not the problem because the encrypted message and key goes separate and one never knows that there is a hidden key there.…”
Section: Resistance Against Dos Attackmentioning
confidence: 99%
“…However, all these events are sometimes hard to be detected in real time from observed traffic. This affair will become harder if the observed network carries a large amount of traffic, which drowns malicious ones . Therefore, how to expose and accurately detect malicious traffic is a pending problem.…”
Section: Introductionmentioning
confidence: 99%