Manipulative Interference Attacks
Abstract
References
Index Terms
- Manipulative Interference Attacks
Recommendations
Detecting SYN flooding attacks based on traffic prediction
SYN flooding attacks are a common type of distributed denial-of-service attacks. Up to now, many defense schemes have been proposed against SYN flooding attacks. Traditional defense schemes rely on passively sniffing an attacking signature and are ...
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
CSF '09: Proceedings of the 2009 22nd IEEE Computer Security Foundations SymposiumAs networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious "input of coma" can trigger high-complexity behavior such as deep recursion in a carelessly ...
Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityThis paper describes a new class of denial-of-service (DoS) attack, which we refer to as Second Order DoS attacks. These attacks consist of two phases, one that pollutes a database with junk entries and another that performs a costly operation on these ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/712fb57b-0abc-456b-b4be-b4801639b630/3658644.cover.jpg)
- General Chairs:
- Bo Luo,
- Xiaojing Liao,
- Jun Xu,
- Program Chairs:
- Engin Kirda,
- David Lie
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 217Total Downloads
- Downloads (Last 12 months)217
- Downloads (Last 6 weeks)86
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in