Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations
Abstract
Supplemental Material
- Download
- 1417.31 MB
- Download
- 28.85 MB
References
Index Terms
- Medusa: Unveil Memory Exhaustion DoS Vulnerabilities in Protocol Implementations
Recommendations
Machine learning combating DOS and DDOS attacks
In recent years, technology is booming at a breakneck speed as so the need of security. Vulnerabilities in the layers of the OSI model and the networks are paving new ways for intruders and hackers to steal the confidential information. Security attacks ...
An Active Security Protocol against DoS Attacks
ISCC '02: Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)Denial of Service (DoS) attacks represent, in today's Internet, one of the most complex issues to address. A session is under a DoS attack if it cannot achieve its intended throughput due to the misbehavior of other sessions. Many research studies dealt ...
TCP Ack storm DoS attacks
We present Ack-storm DoS attacks, a new family of DoS attacks exploiting a subtle design flaw in the core TCP specifications. The attacks can be launched by a very weak MitM attacker, which can only eavesdrop occasionally and spoof packets (a Weakling ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Tat-Seng Chua,
- Chong-Wah Ngo,
- Proceedings Chair:
- Roy Ka-Wei Lee,
- Program Chairs:
- Ravi Kumar,
- Hady W. Lauw
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Chinese National Key R&D Program
- RIE2020 Industry Alignment Fund
- Chinese National Natural Science Foundation
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 483Total Downloads
- Downloads (Last 12 months)483
- Downloads (Last 6 weeks)43
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in