IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Network Intrusion Tracking for DoS Attacks

Network Intrusion Tracking for DoS Attacks
View Sample PDF
Author(s): Mahbubur R. Syed (Minnesota State University, USA), Mohammad M. Nur (Minnesota State University, USA)and Robert J. Bignall (Monash University, Australia)
Copyright: 2005
Pages: 8
Source title: Encyclopedia of Multimedia Technology and Networking
Source Author(s)/Editor(s): Margherita Pagani (Bocconi University, Italy)
DOI: 10.4018/978-1-59140-561-0.ch106

Purchase

View Network Intrusion Tracking for DoS Attacks on the publisher's website for pricing and purchasing information.

Abstract

In recent years the Internet has become the most popular and useful medium for information interchange due to its wide availability, flexibility, universal standards, and distributed architecture. As an outcome of increased dependency on the Internet and networked systems, intrusions have become a major threat to Internet users. Network intrusions may be categorized into the following major types: • Stealing valuable and sensitive information • Destroying or altering information • Obstructing the availability of information by destroying the service-providing ability of a victim’s server

Related Content

Nithin Kalorth, Vidya Deshpande. © 2024. 7 pages.
Nitesh Behare, Vinayak Chandrakant Shitole, Shubhada Nitesh Behare, Shrikant Ganpatrao Waghulkar, Tabrej Mulla, Suraj Ashok Sonawane. © 2024. 24 pages.
T.S. Sujith. © 2024. 13 pages.
C. Suganya, M. Vijayakumar. © 2024. 11 pages.
B. Harry, Vijayakumar Muthusamy. © 2024. 19 pages.
Munise Hayrun Sağlam, Ibrahim Kirçova. © 2024. 19 pages.
Elif Karakoç Keskin. © 2024. 19 pages.
Body Bottom