Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Denial of Service Attack

Handbook of Research on Emerging Developments in Data Privacy
An attempt to block large parts of the memory of a target system, such that it can no longer serve its users. This situation leads to crashing, rebooting or denial of services to legitimate users.
Published in Chapter:
An Auto-Reclosing-Based Intrusion Detection Technique for Enterprise Networks
Nana K. Ampah (Jacobs Engineering Group, USA) and Cajetan M. Akujuobi (Prairie View A&M University, USA)
Copyright: © 2015 |Pages: 32
DOI: 10.4018/978-1-4666-7381-6.ch017
Designing, planning, and managing telecommunication, industrial control, and enterprise networks with special emphasis on effectiveness, efficiency, and reliability without considering security planning, management, and constraints have made them vulnerable. They have become more vulnerable due to their recent connectivity to open networks with the intention of establishing decentralized management and remote control. Existing Intrusion Prevention and Detection Systems (IPS and IDS) do not guarantee absolute security. The new IDS, which employs both signature-based and anomaly detection as its analysis strategies, will be able to detect both known and unknown attacks and further isolate them. Auto-reclosing techniques used on long rural power lines and multi-resolution techniques were used in developing this IDS, which will help update existing IPSs. It should effectively block Distributed Denial of Service attack (DDoS) based on SNY-flood attacks and help eliminate four out of the five major limitations of existing IDSs and IPSs.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Distributed Denial of Service Attacks and Defense in Cloud Computing
An attack which makes a service un-available to its users. This attack is performed by single machine.
Full Text Chapter Download: US $37.50 Add to Cart
Security Issues of Smartphones Regarding M-Commerce
Trying to make a network resource unavailable by flooding it with useless traffic.
Full Text Chapter Download: US $37.50 Add to Cart
Security in Border Gateway Protocol (BGP)
An attack in which an attacker does not allow the legitimate users to access the required service(s) by disrupting connectivity or creating instabilities.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent-Based Information Systems and Security
Defined as partially or completely impeding one or more computer services, or a mobile agent’s access to some resources or services.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR