Showing 1 - 10 of 3,467
Persistent link: https://www.econbiz.de/10013343211
Persistent link: https://www.econbiz.de/10014302482
Criminals use the anonymity and pervasiveness of the Internet to commit fraud, extortion, and theft. Botnets are used as the primary tool for this criminal activity. Botnets allow criminals to accumulate and covertly control multiple Internet-connected computers. They use this network of...
Persistent link: https://www.econbiz.de/10009476126
Intrusion Detection System (IDS) are actively used to identify any unusual activities in a network. To improve the effectiveness of IDS, security experts have embedded their extensive knowledge with the use of fuzzy logic, neuro-fuzzy, neural network and other such AI techniques. This article...
Persistent link: https://www.econbiz.de/10012047565
This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks. It is based on time preference dynamics applied to the monetary mass for the restoration of capabilities, on long term investments to rebuild...
Persistent link: https://www.econbiz.de/10005040716
This paper develops a new method of identifying why current product unavailability has an effect on future brand choices. If the impact is solely due to changing preferences, then all competitors of the unavailable item gain proportionally to their share; if, however, there is lock-in, then the...
Persistent link: https://www.econbiz.de/10005701814
This paper describes the most common types of DoS, including the latest one, named Distributed Reflection Denial of Service. The operation of the Internet’s TCP protocol is followed by complete explanation on how several types of DoS work. Bandwidth and CPU load are very important aspects on...
Persistent link: https://www.econbiz.de/10009144584
E-business consists mostly in the implementation of the business processes by using the information technology and internet services. Since all business processes must be connected to the internet and available for users, the choice of the information solutions on which e-business is built is...
Persistent link: https://www.econbiz.de/10010700167
level. These security solutions prove to be largely inadequate in times of a DDoS cyber-attack. In this paper, traditional … DDoS attacks is measured for Real User Monitoring parameters, compared for the two infrastructure designs and the data is …
Persistent link: https://www.econbiz.de/10012043379
members and used to initiate very large volumetric Distributed Denial of Service (DDoS) attacks. The significance of the … DDoS attack. The method can scale depending on the availability of the infrastructure from a conventional laptop computer …
Persistent link: https://www.econbiz.de/10012043891