Defending Servers Against Naptha Attack By Using An Early Client Authentication Method [TK5105.585. C518 2008 f rb].
Serangan Naptha bertujuan mengganggu layanan TCP yang ditawarkan oleh sesuatu pelayan dengan menjanakan banyak sambungan palsu terhadap pelayan tersebut. Naptha attack aims to disrupt TCP service a server provides by generating large amount of forged connections to the server.
| Main Author: | Cheng, Han Pin |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/9627/ http://eprints.usm.my/9627/1/DEFENDING_SERVERS_AGAINST_NAPTHA_ATTACK_BY_USING_AN_EARLY_CLIENT_AUTHENTICATION_METHOD.pdf |
Similar Items
Web Personalization Using Implicit Input
[TK5105.888. P187 2007 f rb].
by: Pan, Yih Jyh
Published: (2006)
by: Pan, Yih Jyh
Published: (2006)
Rekabentuk Dan Perlaksanaan Terminal Voip [TK5105.8865 A836 2004 f rb] [Microfiche 7998].
by: Romli, Muhamad Asmi
Published: (2004)
by: Romli, Muhamad Asmi
Published: (2004)
Dynamic Images Carousel Transmissions Over Multiple Multicast Groups [TK5105.2. S959 2004 f rb] [Microfiche 7962].
by: Ratsameemonthol, Supakorn
Published: (2004)
by: Ratsameemonthol, Supakorn
Published: (2004)
Implementing Wavelength Division Multiplexing For High Speed FDDI Network.[TK5105.7. M952 2002 f rb][Microfiche 6935]
by: Mustafa Al Jada, Muhsen Abdl Mughni
Published: (2002)
by: Mustafa Al Jada, Muhsen Abdl Mughni
Published: (2002)
Pemodelan Dan Analisis Rangkaian Kawasan Setempat Pelbagai Saluran Optikal [TK5105.8.I44 A995 2007 f rb].
by: Abdul Halim, Aznor Hanah
Published: (2007)
by: Abdul Halim, Aznor Hanah
Published: (2007)
Efficient authentication mechanism for defending against reflection-based attacks on domain name system
by: Hasan, Dana, et al.
Published: (2020)
by: Hasan, Dana, et al.
Published: (2020)
Effective way to defend the hypervisor attacks in cloud computing
by: Muhammad Shahid, Dildar, et al.
Published: (2017)
by: Muhammad Shahid, Dildar, et al.
Published: (2017)
Mosquitto: server and client implementation of the MQTT protocol
by: Light, Roger A.
Published: (2017)
by: Light, Roger A.
Published: (2017)
Automatic pet feeder with client / server application
by: Khairul Anwar, Mohd Yakop
Published: (2008)
by: Khairul Anwar, Mohd Yakop
Published: (2008)
Cybercafe system using client-server application
by: Farhana, Abdul Samad
Published: (2011)
by: Farhana, Abdul Samad
Published: (2011)
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017)
by: Nayeem, Khan, et al.
Published: (2017)
Distributed Client/Server Architecture With Dynamic Middle Tier
by: Choong, Khong Neng
Published: (1999)
by: Choong, Khong Neng
Published: (1999)
Client/server connection establishing and configuration / Loo Chee Keong
by: Loo , Chee Keong
Published: (2002)
by: Loo , Chee Keong
Published: (2002)
A model for client recommendation to a desktop grid server
by: Shafazand, Mohammad Yaser, et al.
Published: (2013)
by: Shafazand, Mohammad Yaser, et al.
Published: (2013)
IPv4 and IPv6 client-server designs: the sockets performance
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Adaptive Client to Mirrored-Server Assignment for Massively Multiplayer Online Games
by: Webb, Steven, et al.
Published: (2008)
by: Webb, Steven, et al.
Published: (2008)
Client/server architecture having a dynamic and transparent middle tier
by: Mohd Ali, Borhanuddin, et al.
Published: (2010)
by: Mohd Ali, Borhanuddin, et al.
Published: (2010)
Control application for client server/based: Interactive Puzzle Game / Evelyn Francis
by: Evelyn , Francis
Published: (2000)
by: Evelyn , Francis
Published: (2000)
Client data backup screen saver (in collaboration with backup server) / Wahida Zakaria
by: Zakaria, Wahida
Published: (2005)
by: Zakaria, Wahida
Published: (2005)
Personal Digital Assistant (PDA) Based Client/Server Data Collection System
by: Balasubramaniam, Nagaletchumi
Published: (2004)
by: Balasubramaniam, Nagaletchumi
Published: (2004)
Performance Enhancement Of Mobile IPv6 Client Using Anycast With Multi-Mirror Servers
by: Neoh, Kee Lin
Published: (2008)
by: Neoh, Kee Lin
Published: (2008)
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
Log visualization of intrusion and prevention reverse proxy server against web attacks
by: Mantoro, Teddy, et al.
Published: (2013)
by: Mantoro, Teddy, et al.
Published: (2013)
An Immunohistochemical Study Of Survivin Expression In
Normal And In Transformed Cells [QH585.2. I82 2006 f rb].
by: Alias, Iskandar Zulkarnain
Published: (2006)
by: Alias, Iskandar Zulkarnain
Published: (2006)
Design Of Microhotplate Based Gas Sensing System [TK7875. Z21 2008 f rb].
by: Abdul Halim, Zaini
Published: (2008)
by: Abdul Halim, Zaini
Published: (2008)
Growth and Characterisation of Low-k dielectric Spin on Glass [QC585. A963 2002 f rb] [Microfiche 7021]
by: Aw, Kean Chin
Published: (2002)
by: Aw, Kean Chin
Published: (2002)
Defending Our Chart And Compass
by: Sunday Star, Martin Vebgadesan
Published: (2008)
by: Sunday Star, Martin Vebgadesan
Published: (2008)
Defend our men in blue
by: Abd Razak, Dzulkifli
Published: (2006)
by: Abd Razak, Dzulkifli
Published: (2006)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
Gagasan Nasionalisme Melayu Raya : Pertumbuhan Dan Perkembangannya [DS518.1. R822 2007 f rb].
by: Saadon, Roslan
Published: (2007)
by: Saadon, Roslan
Published: (2007)
PLG 518: Pengajian Pendidikan Guru
by: PPIP, Pusat Pengajian Ilmu Pendidikan
Published: (1997)
by: PPIP, Pusat Pengajian Ilmu Pendidikan
Published: (1997)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
Defending the French language: an online battle?
by: Humphries, Emma
Published: (2017)
by: Humphries, Emma
Published: (2017)
Protecting environmental defenders to prevent pandemics
by: Aruta, John Jamir Benzon R *, et al.
Published: (2022)
by: Aruta, John Jamir Benzon R *, et al.
Published: (2022)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
EAP585 - SOLID AND HAZARDOUS WASTE MANAGEMENT. NOVEMBER 2005
by: PPKAW, Pusat Pengajian Kejuruteraan Awam
Published: (2005)
by: PPKAW, Pusat Pengajian Kejuruteraan Awam
Published: (2005)
AGW518 - FINANCIAL MANAGEMENT - APRIL 1995.
by: PPP, Pusat Pengajian Pengurusan
Published: (1995)
by: PPP, Pusat Pengajian Pengurusan
Published: (1995)
AGW 518 - FINANCIAL MANAGEMENT APRIL 1996
by: PPP, Pusat Pengajian Pengurusan
Published: (1996)
by: PPP, Pusat Pengajian Pengurusan
Published: (1996)
AGW 518 - FINANCIAL MANAGEMENT APRIL 1993.
by: PPP, Pusat Pengajian Pengurusan
Published: (1993)
by: PPP, Pusat Pengajian Pengurusan
Published: (1993)
Similar Items
-
Web Personalization Using Implicit Input
[TK5105.888. P187 2007 f rb].
by: Pan, Yih Jyh
Published: (2006) -
Rekabentuk Dan Perlaksanaan Terminal Voip [TK5105.8865 A836 2004 f rb] [Microfiche 7998].
by: Romli, Muhamad Asmi
Published: (2004) -
Dynamic Images Carousel Transmissions Over Multiple Multicast Groups [TK5105.2. S959 2004 f rb] [Microfiche 7962].
by: Ratsameemonthol, Supakorn
Published: (2004) -
Implementing Wavelength Division Multiplexing For High Speed FDDI Network.[TK5105.7. M952 2002 f rb][Microfiche 6935]
by: Mustafa Al Jada, Muhsen Abdl Mughni
Published: (2002) -
Pemodelan Dan Analisis Rangkaian Kawasan Setempat Pelbagai Saluran Optikal [TK5105.8.I44 A995 2007 f rb].
by: Abdul Halim, Aznor Hanah
Published: (2007)