Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 3

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  Distributed Denial of Service
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
Content available Nordic countries in the face of digital threats
EN
Technological advances and the digital revolution have caused much of social activity to move online. The Internet has become a tool without which it is difficult to imagine the functioning of modern states. However, it is also some of conflicts between states that have moved online, and states with the highest degree of digitization, which include the Nordic states, have become a target of attacks by other states or organizations. In this article, the Author will attempt to answer the question of how the Nordic states and their societies defend themselves against cyber threats. The characteristics of the attacks carried out against them and the levels of digitization of the societies will also be compared.
PL
Postęp technologiczny i rewolucja cyfrowa sprawiły, że znaczna część aktywności spo-łecznych przeniosła się do sieci. Internet stał się narzędziem, bez którego trudno wyobra¬zić sobie funkcjonowanie współczesnych państw. Jednocześnie część konfliktów między państwami także przeniosła się do sieci, a państwa o najwyższym stopniu cyfryzacji, do których można zaliczyć państwa nordyckie, stały się celem ataków innych państw lub or-ganizacji. W artykule autor podjął próbę odpowiedzi na pytanie: W jaki sposób państwa nor¬dyckie i ich społeczeństwa bronią się przed cyberzagrożeniami? Porównał charakterysty¬ki przeprowadzanych przeciwko nim ataków oraz poziomy cyfryzacji społeczeństw.
EN
Distributed Denial of Service (DDoS) attacks constitute a major threat in the current Internet. These cyber-attacks aim to flood the target system with tailored malicious network traffic overwhelming its service capacity and consequently severely limiting legitimate users from using the service. This paper builds on the state-of-the-art AATAC algorithm (Autonomous Algorithm for Traffic Anomaly Detection) and provides a concept of a dedicated inline DDoS detector capable of real-time monitoring of network traffic and near-real-time anomaly detection. The inline DDoS detector consists of two main elements: 1) inline probe(s) responsible for link-rate real-time processing and monitoring of network traffic with custom-built packet feature counters, and 2) an analyser that performs the near-real-time statistical analysis of these counters for anomaly detection. These elements communicate asynchronously via the Redis database, facilitating a wide range of deployment scenarios. The inline probes are based on COTS servers and utilise the DPDK framework (Data Plane Development Kit) and parallel packet processing on multiple CPU cores to achieve link rate traffic analysis, including tailored DPI analysis.
3
Content available remote Exact and approximation algorithms for sensor placement against DDoS attacks
EN
In DDoS attack (Distributed Denial of Service), an attacker gains control of many network users by a virus. Then the controlled users send many requests to a victim, leading to lack of its resources. DDoS attacks are hard to defend because of distributed nature, large scale and various attack techniques. One of possible ways of defense is to place sensors in the network that can detect and stop an unwanted request. However, such sensors are expensive so there is a natural question about a minimum number of sensors and their optimal placement to get the required level of safety. We present two mixed integer models for optimal sensor placement against DDoS attacks. Both models lead to a trade-off between the number of deployed sensors and the volume of uncontrolled flow. Since above placement problems are NP-hard, two efficient heuristics are designed, implemented and compared experimentally with exact linear programming solvers.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.