Forensics of Random-UDP Flooding Attacks

Provided by: Academy Publisher
Topic: Security
Format: PDF
Internet has great impact on various facets of everyone's life. With the enormous advantage Internet provides to users all around the world, it has some inherent weaknesses because of the protocol stack on which it is built. It can be easily attacked by attackers who exploit the vulnerabilities in the protocols and compromise systems and remotely control them to do further damage. Major attacks are focused on confidentiality, integrity and availability of data or resources. Flooding attack is one such resource availability attack which is a great cause of concern.

Find By Topic