DoS attacks (Denial of Service) are one of the main problems on computer security field. Usually these attacks result in the loss of network connectivity due to excessive bandwidth-consuming and resource bottlenecks of the system attacked. DoS attacks can occur in various ways; however all of them have in common the use of IP protocol. This work presents the effects on network elements and security controls by the application of DoS attacks by flooding techniques in computer networks, with the aim of mitigating them.
%0 Journal Article
%1 IJCOPI88
%A Prudente Tixteco, Lidia
%A Aguirre A., Eleazar
%A Hdez., Alba F. Moreno
%A V., Ruben J. García
%D 2012
%J International Journal of Combinatorial Optimization Problems and Informatics
%K DoS
%N 2
%P 3-13
%T DoS Attacks Flood Techniques
%U http://ijcopi.org/ojs/index.php?journal=ijcopi&page=article&op=view&path%5B%5D=88
%V 3
%X DoS attacks (Denial of Service) are one of the main problems on computer security field. Usually these attacks result in the loss of network connectivity due to excessive bandwidth-consuming and resource bottlenecks of the system attacked. DoS attacks can occur in various ways; however all of them have in common the use of IP protocol. This work presents the effects on network elements and security controls by the application of DoS attacks by flooding techniques in computer networks, with the aim of mitigating them.
@article{IJCOPI88,
abstract = {DoS attacks (Denial of Service) are one of the main problems on computer security field. Usually these attacks result in the loss of network connectivity due to excessive bandwidth-consuming and resource bottlenecks of the system attacked. DoS attacks can occur in various ways; however all of them have in common the use of IP protocol. This work presents the effects on network elements and security controls by the application of DoS attacks by flooding techniques in computer networks, with the aim of mitigating them.},
added-at = {2012-04-29T03:30:53.000+0200},
author = {Prudente Tixteco, Lidia and Aguirre A., Eleazar and Hdez., Alba F. Moreno and V., Ruben J. García},
biburl = {https://www.bibsonomy.org/bibtex/2eeaa54deb1b9ad2791db9103f3a2c1ee/ijcopi},
interhash = {8bc7d68b24beb27a9700e303e81f030f},
intrahash = {eeaa54deb1b9ad2791db9103f3a2c1ee},
issn = {2007-1558},
journal = {International Journal of Combinatorial Optimization Problems and Informatics},
keywords = {DoS},
number = 2,
pages = {3-13},
timestamp = {2012-04-29T03:30:53.000+0200},
title = {DoS Attacks Flood Techniques},
url = {http://ijcopi.org/ojs/index.php?journal=ijcopi&page=article&op=view&path%5B%5D=88},
volume = 3,
year = 2012
}