Kontaktujte nás | Jazyk: čeština English
dc.title | Launching distributed denial of service attacks by network protocol exploitation | en |
dc.contributor.author | Jašek, Roman | |
dc.contributor.author | Benda, Radek | |
dc.contributor.author | Vala, Radek | |
dc.contributor.author | Sarga, Libor | |
dc.relation.ispartof | Recent Researches in Applied Informatics - Proceedings of the 2nd International Conference on Applied Informatics and Computing Theory, AICT'11 | |
dc.identifier.isbn | 978-1-61804-034-3 | |
dc.date.issued | 2011 | |
dc.citation.spage | 210 | |
dc.citation.epage | 216 | |
dc.event.title | 2nd International Conference on Applied Informatics and Computing Theory, AICT'11 | |
dc.event.location | Prague | |
utb.event.state-en | Czech Republic | |
utb.event.state-cs | Česká republika | |
dc.event.sdate | 2011-09-26 | |
dc.event.edate | 2011-09-28 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.subject | DDoS | en |
dc.subject | LOIC | en |
dc.subject | malware | en |
dc.subject | network protocols | en |
dc.subject | security risks | en |
dc.description.abstract | The article aims to provide a concise introduction to the network protocols and methods of their exploitation. This may lead to instigating DDoS (Distributed Denial of Service) attacks which focus on flooding and saturating elements of victim's physical network infrastructure. In the first part layers of the RFC (Request for Comments) and the OSI (Open Systems Interconnection) models are delimited along with their differences and protocols associated. The HTTP (Hypertext Transfer Protocol) standard is treated preferentially as it forms communication framework of the Internet. The second part focuses on the most prolific type of network incursion currently in use, DDoS, its structure and a freely available tool LOIC (Low Orbit Ion Cannon) utilized to launch it. The third part evaluates specific forms of DDoS, including known measures to counter them. The conclusion summarizes the text and briefly hypothesizes about the future in the field. | en |
utb.faculty | Faculty of Applied Informatics | |
utb.faculty | Faculty of Management and Economics | |
dc.identifier.uri | http://hdl.handle.net/10563/1004847 | |
utb.identifier.obdid | 43865274 | |
utb.identifier.scopus | 2-s2.0-81755169918 | |
utb.source | d-scopus | |
dc.date.accessioned | 2015-06-04T12:55:44Z | |
dc.date.available | 2015-06-04T12:55:44Z | |
utb.contributor.internalauthor | Jašek, Roman | |
utb.contributor.internalauthor | Benda, Radek | |
utb.contributor.internalauthor | Vala, Radek | |
utb.contributor.internalauthor | Sarga, Libor |