Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

Provided by: Research In Motion
Topic: Security
Format: PDF
In recent years, everybody experienced a flow of DDoS attacks threatening the welfare of the internet. These are launched by unauthorized users whose only motivation is to degrade the performance of other, innocent, users. The traditional systems turn out to be quite vulnerable to these attacks. This paper is to aiming at laying a foundation that can be used in future computer/network designs taking into account the malicious users. This approach is based on proposing a metric that evaluates the vulnerability of a system.

Find By Topic