期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks 被引量:2
1
作者 Rodolfo Baez Junior Sanjeev Kumar 《Journal of Information Security》 2014年第3期123-135,共13页
With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or ... With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its services. Recently, Operating Systems (OS) are increasingly deploying embedded DDoS prevention schemes to prevent computing exhaustion caused by such attacks. In this paper, we compare the effectiveness of two popular operating systems, namely the Apple’s Lion and Microsoft’s Windows 7, against DDoS attacks. We compare the computing performance of these operating systems under two ICMP based DDoS attacks. Since the role of the OS is to manage the computer or servers resources as efficiently as possible, in this paper we investigate which OS manages its computing resources more efficiently. In this paper, we evaluate and compare the built-in security of these two operating systems by using an iMac computer which is capable of running both Windows 7 and Lion. The DDoS attacks that are simulated for this paper are the ICMP Ping and Land Attack. For this experiment, we measure the exhaustion of the processors and the number of Echo Request and Echo Reply messages that were generated under varying attack loads for both the Ping and Land Attack. From our experiments, we found that both operating systems were able to survive the attacks however they reacted a bit differently under attack. The Operating System Lion was handling both the Ping and Land attack in the exactly the same way, whereas Windows 7 handled the two attacks a bit differently, resulting in different processor consumptions by two different operating systems. 展开更多
关键词 DENIAL of Service (DOS) ATTACK ECHO Request ECHO REPLY Internet Control Message Protocol (ICMP) Land ATTACK Operating System (OS) Ping ATTACK
下载PDF
Construct and Convergent Validity of the OIS-Garcia (Optimist Interactive Style) Scales in a Mexican Population
2
作者 Cirilo H. Garcia Hector L. Diaz +4 位作者 Arnoldo Tellez Fuensanta Lopez Juan Martinez Lorenzo Sanchez Enrique Garcia 《Psychology Research》 2013年第9期518-528,共11页
关键词 西亚 收敛 墨西哥 人口 风格 定位测试 验证过程 平均年龄
下载PDF
Extracting Information from the Atom-Laser Wave Function Using Interferometric Measurement with a Laser Standing-Wave Grating
3
作者 LIU Zheng-Dong ZENG Liang +2 位作者 LIN Yu WU Qiang ZHU Shi-Yao 《Chinese Physics Letters》 SCIE CAS CSCD 2001年第8期1000-1003,共4页
The reconstruction of the atom-laser wave function is performed using interferometric measurement with a standing-wave grating,and the results in this scheme are studied.The relation between the measurement data and t... The reconstruction of the atom-laser wave function is performed using interferometric measurement with a standing-wave grating,and the results in this scheme are studied.The relation between the measurement data and the atomic wave function are also presented.This scheme is quite applicable and effectively avoids the initial random phase problem of the method that employs the laser running wave.The information which is encoded in the atom-laser wave is extracted. 展开更多
关键词 WAVE scheme WAVE
下载PDF
Buffer Management in the Sliding-Window (SW) Packet Switch for Priority Switching
4
作者 Alvaro Munoz Sanjeev Kumar 《International Journal of Communications, Network and System Sciences》 2014年第7期248-255,共8页
Switch and router architectures employing a shared buffer are known to provide high throughput, low delay, and high memory utilization. Superior performance of a shared-memory switch compared to switches employing oth... Switch and router architectures employing a shared buffer are known to provide high throughput, low delay, and high memory utilization. Superior performance of a shared-memory switch compared to switches employing other buffer strategies can be achieved by carefully implementing a buffer-management scheme. A buffer-sharing policy should allow all of the output interfaces to have fair and robust access to buffer resources. The sliding-window (SW) packet switch is a novel architecture that uses an array of parallel memory modules that are logically shared by all input and output lines to store and process data packets. The innovative aspects of the SW architecture are the approach to accomplishing parallel operation and the simplicity of the control functions. The implementation of a buffer-management scheme in a SW packet switch is dependent on how the buffer space is organized into output queues. This paper presents an efficient SW buffer-management scheme that regulates the sharing of the buffer space. We compare the proposed scheme with previous work under bursty traffic conditions. Also, we explain how the proposed buffer-management scheme can provide quality-of-service (QoS) to different traffic classes. 展开更多
关键词 SLIDING Windows SWITCH PRIORITY SWITCHING BUFFER Management
下载PDF
Evaluation of Microsoft Windows Servers 2008 &2003 against Cyber Attacks
5
作者 Sanjeev Kumar Senior Member Raja Sekhar Reddy Gade 《Journal of Information Security》 2015年第2期155-160,共6页
Distributed Denial of Service (DDoS) is known to compromise availability of Information Systems today. Widely deployed Microsoft’s Windows 2003 & 2008 servers provide some built-in protection against common Distr... Distributed Denial of Service (DDoS) is known to compromise availability of Information Systems today. Widely deployed Microsoft’s Windows 2003 & 2008 servers provide some built-in protection against common Distributed Denial of Service (DDoS) attacks, such as TCP/SYN attack. In this paper, we evaluate the performance of built-in protection capabilities of Windows servers 2003 & 2008 against a special case of TCP/SYN based DDoS attack. Based on our measurements, it was found that the built-in security features which are available by default on Microsoft’s Windows servers were not sufficient in defending against the TCP/SYN attacks even at low intensity attack traffic. Under TCP/SYN attack traffic, the Microsoft 2003 server was found to crash due to processor resource exhaustion, whereas the 2008 server was found to crash due to its memory resource depletion even at low intensity attack traffic. 展开更多
关键词 CYBER Warfare Distributed DENIAL of Service ATTACKS TCP/SYN Flood Processor RESOURCE EXHAUSTION Memory RESOURCE EXHAUSTION
下载PDF
Experimental Evaluation of Cisco ASA-5510 Intrusion Prevention System against Denial of Service Attacks
6
作者 Sanjeev Kumar Raja Sekhar Reddy Gade 《Journal of Information Security》 2012年第2期122-137,共16页
Cyber attacks are continuing to hamper working of Internet services despite increase in the use of network security systems such as, firewalls and Intrusion protection systems (IPS). Recent Denial of Service (DoS) att... Cyber attacks are continuing to hamper working of Internet services despite increase in the use of network security systems such as, firewalls and Intrusion protection systems (IPS). Recent Denial of Service (DoS) attack on Independence Day weekend, on July 4th, 2009 launched to debilitate the US and South Korean governments’ websites is indicative of the fact that the security systems may not have been adequately deployed to counteract such attacks. IPS is a vital security device which is commonly used as a front line defense mechanism to defend against such DoS attacks. Before deploying a firewall or an IPS device for network protection, in many deployments, the performance of firewalls is seldom evaluated for their effectiveness. Many times, these IPS’s can become bottleneck to the network performance and they may not be effective in stopping DoS attacks. In this paper, we intend to drive the point that deploying IPS may not always be effective in stopping harmful effects of DoS attacks. It is important to evaluate the capability of IPS before they are deployed to protect a network or a server against DoS attacks. In this paper, we evaluate performance of a commercial grade IPS Cisco ASA-5510 IPS to measure its effectiveness in stopping a DoS attacks namely TCP-SYN, UDP Flood, Ping Flood and ICMP Land Attacks. This IPS comes with features to counteract and provide security against these attacks. Performance of the IPS is measured under these attacks protection and compared with its performance when these protection features were not available (i.e. disabled). It was found that the IPS was unable to provide satisfactory protection despite the availability of the protection features against these flooding attacks. It is important for the network managers to measure the actual capabilities of an IPS system before its deployment to protect critical information infrastructure. 展开更多
关键词 DENIAL of Service (DoS) SYN FLOOD Attack PROXY Protection FIREWALL Security AVAILABILITY
下载PDF
Pfaffian-Type Soliton Solution to a Multi-Component Coupled Ito Equation
7
作者 陈俊超 陈勇 +1 位作者 冯宝峰 朱汉敏 《Chinese Physics Letters》 SCIE CAS CSCD 2014年第11期30-34,共5页
Multi-soliton solution to a multi-component coupled Ito system is investigated based on the Hirota bilinear method. By virtue of the perturbation method, we firstly derive one- and two-soliton solutions for the couple... Multi-soliton solution to a multi-component coupled Ito system is investigated based on the Hirota bilinear method. By virtue of the perturbation method, we firstly derive one- and two-soliton solutions for the coupled Ito system possessing four components. Then the multi-soliton solution for the multi-component coupled Ito system is summarized into a general form expressed by pfaffians. Finally, this general pfaffian-type soliton solution is proved by pfaffian techniques. 展开更多
下载PDF
Integrable discretizations of the Dym equation
8
作者 Bao-Feng FENG Jun-ichi INOGUCHI +2 位作者 Kenji KAJIWARA Ken-ichi MARUNO Yasuhiro OHTA 《Frontiers of Mathematics in China》 SCIE CSCD 2013年第5期1017-1029,共13页
Integrable discretizations of are proposed. N-soliton solutions for analogues of the complex and real Dym the complex and real Dym equations both semi-discrete and fully discrete equations are also presented.
关键词 Dym equation integrable discretization N-soliton solution
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部