Subject

Subjects : denial of service (DoS)

  • Articles (58)
  • Patents (2)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Conference 2024 Defending Against EMI Attacks on Just-In-Time Checkpoint for Resilient Intermittent Systems   Jaeseok Choi  International Symposium on Microarchitecture (MICRO) 2024, pp.1-15 1 원문
Conference 2024 Caphammer: Exploiting Capacitor Vulnerability of Energy Harvesting Systems   Joe Hyunwoo  International Conference on Embedded Software (EMSOFT) 2024 / IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp.1-12 3 원문
Conference 2024 Caphammer: Exploiting Capacitor Vulnerability of Energy Harvesting Systems   최종욱  International Conference on Embedded Software (EMSOFT) 2024 / IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pp.1-12 3 원문
Conference 2024 Analyzing the container security threat on the 5G Core Network   Jihyeon Song  Silicon Valley Cybersecurity Conference (SVCC) 2024, pp.1-3 0 원문
Conference 2023 Partitioning Ethereum without Eclipsing It   Heo Hwanjo  Network and Distributed System Security Symposium (NDSS) 2023, pp.1-18 10 원문
Conference 2022 Network Detection of Fake Base Station using Automatic Neighbour Relation in Self-Organizing Networks   Shin Ji Soo  International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.968-970 4 원문
Conference 2021 Countering Interest flooding DDoS attacks in NDN Network   Sul Dong Myung  International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1412-1414 0 원문
Journal 2021 A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools   Song-Yi Hwang  Sensors, v.21, no.21, pp.1-23 8 원문
Conference 2021 Behind Block Explorers: Public Blockchain Measurement and Security Implication   Heo Hwanjo  International Conference on Distributed Computing Systems (ICDCS) 2021, pp.216-226 5 원문
Conference 2020 Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT   Lim Jae Deok  International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 2 원문
Conference 2020 Hierarchical Access Control for SDP-IoT   Lee Yun-Kyung  International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1742-1744 2 원문
Journal 2019 A Secure Charging System for Electric Vehicles Based on Blockchain   김명현  Sensors, v.19, no.13, pp.1-22 65 원문
Conference 2018 Abnormal Traffic Detection Mechanism for Protecting IIoT Environments   Byoung Koo Kim  International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 8 원문
Conference 2017 Self-certifying ID based Trustworthy Networking System for IoT Smart Service Domain   Kim Eung Ha  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1300-1302 7 원문
Conference 2017 Trust Domain Based Trustworthy Networking   Byeongok Kwak  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1248-1250 5 원문
Conference 2017 Netflow Based HTTP Get Flooding Attack Analysis   Jung Tae Kim  International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2017
Conference 2016 Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis   Jung Tae Kim  International Conference on Evolving Internet (INTERNET) 2016, pp.20-25
Conference 2015 Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology   Lee Sokjoon  International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337
Journal 2015 Tag-Reader Mutual Authentication Protocol for Safe RFID/USN Environments   Bang Hyochan  Information : An International Interdisciplinary Journal, v.18, no.12, pp.5103-5116 0
Conference 2015 A Technique to Make a Path Table for Blocking Distributed Denial-of-Service Attacks   Eun Jee Sook  International Conference on Future Generation Communication and Networking (FGCN) 2015, pp.13-16 1 원문
Journal 2015 Cyber Genome Technology for Countering Malware   Kim Jonghyun  전자통신동향분석, v.30, no.5, pp.118-128 원문
Journal 2015 Controller Scheduling for Continued SDN Operation under DDoS Attacks   임승헌  Electronics Letters, v.51, no.16, pp.1259-1261 52 원문
Conference 2015 A Design of Authentication Method Based on Magnetic Field Area Network   Juyoung Park  International Conference on Convergence and its Application (ICCA) 2015, v.10, no.13, pp.33574-33576 0
Journal 2014 A Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router   Park Pyung-Koo  Multimedia Tools and Applications, v.74, no.16, pp.6341-6363 1 원문
Journal 2014 Technical Trends of the Cyber Attack Traceback   Jung Tae Kim  전자통신동향분석, v.29, no.1, pp.93-103 원문
Conference 2014 Defenses against ICMP Flooding Attacks   Byoung Koo Kim  International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2
Conference 2013 Detecting Application Layer-based Slow DDoS Attack   Yoon Seung Yong  Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.319-322
Conference 2013 Detecting UDP Flooding Attacks Based on Attack Traffic Characteristics   Byoung Koo Kim  Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2013, pp.337-340
Journal 2013 GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection   Kim Hyun Joo  Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 0
Journal 2013 Web Page Request Behavior Analysis for Threshold based HTTP GET Flooding Attack Detection   Choi Yangseo  Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6025-6040 0
Conference 2013 Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis   Lim Sun Hee  International Conference on Networked Computing and Advanced Information Management (NCM) 2013, pp.502-507
Conference 2013 Service-Oriented DDoS Detection Mechanism Using Pseudo State in a Flow Router   Park Pyung-Koo  International Conference on Information Science and Applications (ICISA) 2013, pp.1-4 0 원문
Conference 2012 A Pseudo State-based Distributed DoS Detection Mechanism using Dynamic Hashing   Park Pyung-Koo  International Conference on Security Technology (SecTech) 2012 (CCIS 339), v.339, pp.22-29 1 원문
Journal 2012 Multicore Flow Processor with Wire-Speed Flow Admission Control   Doo Kyeong Hwan  ETRI Journal, v.34, no.6, pp.827-837 5 원문
Journal 2012 Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid   최경  Energies, v.5, no.10, pp.4091-4109 35 원문
Conference 2012 Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding   Kim Dae Won  International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 1 원문
Conference 2012 AIGG Threshold Based HTTP GET Flooding Attack Detection   Choi Yangseo  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.270-284 14 원문
Conference 2012 Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks   김현주  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 6 원문
Conference 2011 Design and Implementation of Secure-NIC System for DDoS Attack Response   Byoung Koo Kim  한국정보처리학회 학술 발표 (추계) 2011, pp.996-998
Journal 2011 Trend on the Future Internet Security Technologies   Lee Sang-Woo  전자통신동향분석, v.26, no.5, pp.102-111 원문
Journal 2011 Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment   Abedelaziz Mohaisen  KSII Transactions on Internet and Information Systems, v.5, no.9, pp.1684-1697 0 원문
Journal 2011 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card   Byoung Koo Kim  정보보호학회논문지, v.21, no.2, pp.119-129
Journal 2010 Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment   송재구  Sensors, v.10, no.11, pp.10376-10386 6 원문
Conference 2010 Control Method for the number of Checkpoint Nodes for Detecting Selective Forwarding Attacks in Wireless Sensor Networks   Lee Sang Jin  International Conference on Information and Communication Technology Convergence (ICTC) 2010, pp.537-538 2 원문
Conference 2010 An Effective Defense Mechanism Against DoS/DDoS Attacks in Flow-based Routers   Park Pyung-Koo  International Conference on Advances in Mobile Computing and Multimedia (MoMM) 2010, pp.442-446 6 원문
Journal 2009 Research on Distributed Denial of Service Attack Response Infrastructure   Choi Yangseo  정보보호학회지, v.19, no.5, pp.11-20
Conference 2009 Protecting IPTV Service Network against Malicious Rendezvous Point   Kwon Hyeok Chan  Information Security Applications (WISA) 2009 (LNCS 5932), v.5932, pp.1-9 1 원문
Conference 2008 Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN   An Gaeil  International Conference on Autonomic and Trusted Computing (ATC) 2008 (LNCS 5060), v.5060, pp.36-46 4 원문
Journal 2008 A dynamic quarantine scheme for controlling unresponsive TCP sessions   Yi Sungwon  Telecommunication Systems, v.37, no.4, pp.169-189 14 원문
Journal 2007 3라운드 스마트카드 기반의 키 교환   권정옥  IEICE Transactions on Communications, v.E90-B, no.11, pp.3255-3258 원문
Conference 2007 A Study of Defense DDoS Attacks using IP Traceback   채철주  International Conference on Intelligent Pervasive Computing (IPC) 2007, pp.402-405 8 원문
Conference 2006 IPv6 Duplicate Address Detection DoS Attack Detector   류승호  International Conference on Hybrid Information Technology (ICHIT) 2006, pp.1-10
Conference 2005 The Method of P2P Traffic Detecting for P2P Harmful Contents Prevention   Lee Ho Gyun  International Conference on Advanced Communication Technology (ICACT) 2005, pp.777-780 원문
Journal 2004 Attacker Response Framework using Mobile Code   Bang Hyochan  정보처리학회논문지 C, v.11C, no.7, pp.959-970
Journal 2004 Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks   Park Sang Kil  정보처리학회논문지 C, v.11, no.7, pp.951-958
Journal 2004 라우터 보안 기술 동향   Chung Bo-Heung  주간기술동향, v.1154, pp.1-12
Conference 2004 The Study about Detection of Traffic Congestion attacks using MIB traffic variables   Park Won-Joo  International Conference on Advanced Communication Technology (ICACT) 2004, pp.199-203 원문
Conference 2003 MF (Minority First) scheme for defeating distributed denial of service attacks   An Gaeil  International Symposium on Computers and Communications (ISCC) 2003, pp.1-6 7 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2016 APPARATUS AND METHOD OF DETECTING DISTRIBUTED REFLECTION DENIAL OF SERVICE ATTACK BASED ON FLOW INFORMATION UNITED STATES
Registered 2016 플로우 정보를 이용한 분산 반사 서비스 거부 공격 검출 장치 및 방법 KOREA KIPRIS
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.