By Topic

A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Mohammed Alhabeeb ; Sch. of Inf. Technol., Monash Univ., Caulfield East, VIC, Australia ; Saad Alsunbul ; Abdullah Almuhaideb ; Phu Dung Le
more authors

Flooding is one type of Denial of Service (DoS) attacks which can cause significant financial losses. This paper presents a new security approach which prevents flooding in the government critical systems and focuses in preventing flooding in non-authenticated client area. A new cooperation with local service providers has been suggested to make the prevention of flooding attacks easier. In addition, dynamic key encryption technique is adapted as a part of the proposed approach to enhance its functionality.

Published in:

Software Engineering Artificial Intelligence Networking and Parallel/Distributed Computing (SNPD), 2010 11th ACIS International Conference on

Date of Conference:

9-11 June 2010