期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
The Network coding based on synchronization in wireless mesh networks self- similar traffic
1
作者 Xia Zhuoqun 《High Technology Letters》 EI CAS 2012年第1期72-76,共5页
The wireless mesh networks trathc are of selt:snmlarlty and the network pertOrmance is degraded by seltsimillar traffic. Network coding is a new technology which improves network performance. An algorithm is presente... The wireless mesh networks trathc are of selt:snmlarlty and the network pertOrmance is degraded by seltsimillar traffic. Network coding is a new technology which improves network performance. An algorithm is presented that it uses network coding to reduce queue length and delay time when self-similar traffic occurs. Based on synchronization, data packets are classified by destination address and lengths. Simulation results show that with the proposed synchronization techniques, network coding, even in scenarios with burst self-similar traffic, where network coding could not have been deployed so far, increases throughput and lowers packet loss in wireless mesh networks. 展开更多
关键词 wireless mesh networks(WMNs) self-similart traffic network coding packet synchronization
在线阅读 下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
2
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (Security Information and Event Management) CISA (Cybersecurity and Infrastructure Security Agency) NIST (National Institute of Standards and Technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge packet) ICMP (Internet Control Message Protocol) Cyberwarfare
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部