{"title":"量化洪水攻击对传输层协议的影响","authors":"S. Tyagi","doi":"10.5121/IJCSA.2014.4607","DOIUrl":null,"url":null,"abstract":"As growth of internet and computer increase day by day so as the growth of attacks on network is also tremendously increased day by day. In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down due to the impact of flooding type denial-of-service attack and shows the result using NS-2 NAM & Xgraph windows in simulation.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"131 1","pages":"79-87"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Quantifying the Impact of Flood Attack on Transport Layer Protocol\",\"authors\":\"S. Tyagi\",\"doi\":\"10.5121/IJCSA.2014.4607\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As growth of internet and computer increase day by day so as the growth of attacks on network is also tremendously increased day by day. In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down due to the impact of flooding type denial-of-service attack and shows the result using NS-2 NAM & Xgraph windows in simulation.\",\"PeriodicalId\":39465,\"journal\":{\"name\":\"International Journal of Computer Science and Applications\",\"volume\":\"131 1\",\"pages\":\"79-87\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Science and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5121/IJCSA.2014.4607\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5121/IJCSA.2014.4607","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
Quantifying the Impact of Flood Attack on Transport Layer Protocol
As growth of internet and computer increase day by day so as the growth of attacks on network is also tremendously increased day by day. In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down due to the impact of flooding type denial-of-service attack and shows the result using NS-2 NAM & Xgraph windows in simulation.
期刊介绍:
IJCSA is an international forum for scientists and engineers involved in computer science and its applications to publish high quality and refereed papers. Papers reporting original research and innovative applications from all parts of the world are welcome. Papers for publication in the IJCSA are selected through rigorous peer review to ensure originality, timeliness, relevance, and readability.