University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Opinnäytteet
  • Pro gradu -tutkielmat
  • View Item
JYX > Opinnäytteet > Pro gradu -tutkielmat > View Item

Distributed denial-of-service attacks in the Internet

Thumbnail
View/Open
922.6 Kb

Downloads:  
Show download detailsHide download details  
Authors
Penttinen, Tuomo
Date
2005
Discipline
TietojärjestelmätiedeInformation Systems Science

 
Keywords
denial-of-service classification concept definitions automated intrusion agent computer security Internet tietoverkot tietoturva
URI

http://urn.fi/URN:NBN:fi:jyu-200662

Metadata
Show full item record
Collections
  • Pro gradu -tutkielmat [24525]

Related items

Showing items with similar title or keywords.

  • On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks 

    Zolotukhin, Mikhail; Kokkonen, Tero; Hämäläinen, Timo; Siltanen, Jarmo (Advanced Institute of Convergence IT, 2016)
    Application-layer denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed by using legitimate ...
  • Intelligent Solutions for Attack Mitigation in Zero-Trust Environments 

    Zolotukhin, Mikhail; Hämäläinen, Timo; Kotilainen, Pyry (Springer, 2022)
    Many of today’s smart devices are rushed to market with little consideration for basic security and privacy protection, making them easy targets for various attacks. Therefore, IoT will benefit from adapting a zero-trust ...
  • IoT -based adversarial attack's effect on cloud data platform services in a smart building context 

    Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Academic Conferences International, 2020)
    IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's ...
  • Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets 

    Vahdani Amoli, Payam (University of Jyväskylä, 2015)
    Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast ...
  • Ohjelmisto-ohjatut verkot ja tunkeutumisen havainnointijärjestelmät 

    Huhtiniemi, Ismo (2017)
    Tässä pro gradu -tutkielmassa tutkitaan ohjelmisto ohjattuja verkkojen kontrollerin ja hyökkäyksen havainnoin järjestelmien yhdessä toimimista, ja Mininet verkko emulaattorin asentamista ja käyttämistä. Tutkielmassa ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre