作者: Emmanuel C. , Sunday A. , Jean-Paul Ainam , Ogu Chiemela
关键词:
摘要: Hackers have devised a recent technique of infiltrating critical infrastructure with wanton applications that gulp at the limited resources possessed by these for meeting needs and deadlines. Also reality is fact hackers could breach already existing trusted or software on bug them malicious codes plunge into state wantonness; consuming limited, making none (or insufficient) available other, equally depend fair portion same to meet their deadlines requirements. This development portends next generation denial service (DoS) distributed (DDoS) attacks infrastructure, where all required discover vulnerabilities in running deliver escalate new wantonness, resulting service. Proposals exist literature forestall an occurrence such attacks, but some not previously been tested; one being documented [1]. research experimental implementation theoretical model proposed cited article, order test validate its workability results. An prototype – codenamed “ResMon” built validated within Ubuntu Linux operating system environment. General Terms Network Security, Denial Service, Critical Infrastructure.