توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقاله‌های نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده می‌شوند.
۱Denial of Service in Components of Information Telecommunication Systems Through the Example of “Network Storm” Attacks
اطلاعات انتشار: World Applied Sciences Journal، بيست و پنجم،شماره۳، ۲۰۱۳، سال
تعداد صفحات: ۶
The article is dedicated to the study of “network storm” attacks aimed at disrupting the availability of information and information resources. The author has examined scenarios and models for “network storm” attacks, which exploit the vulnerability of the hardware and information technology of attacked components of information telecommunication systems (ITCS). The first scenario implies exploiting a vulnerability during the switching process – flooding a switch’s MAC Table through a massive MAC flooding attack, whereby a malicious user can direct a critical volume of malicious traffic at all the elements of an ITCS being attacked, which will result in a denial–of–service and lead to a disruption of the availability of information and information resources. Carrying out a “network storm” attack according to the second scenario implies exploiting a vulnerability during the routing process – when on the strength of the default settings there is a regular situation of uncertainty between two components of an ITCS, which can be exploited by the malicious user who directs a critical volume of malicious traffic at the elements of the ITCS being attacked, which will also lead to a disruption of the availability of information and information resources.
نمایش نتایج ۱ تا ۱ از میان ۱ نتیجه