The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mechanism is proposed to protect the server from TCP SYN flooding. The results show that the defense against SYN flood DDoS attack is enhanced, since the availability of legitimate packets is increased and the time of SYN Cookie activity is delayed.
Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreIn this paper, the conditions of occurrence of the local bifurcation (such as saddle-node, transcritical and pitchfork) near each of the equilibrium points of a mathematical model consists from four-species Syn- Ecosymbiosis are established.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreLink failure refers to the failure between two connections/nodes in a perfectly working simulation scenario at a particular instance. Transport layer routing protocols form an important basis of setting up a simulation, with Transmission Control Protocol and User Datagram Protocol being the primary of them. The research makes use of Network Simulator v2.35 to conduct different simulation experiments for link failure and provide validation results. In this paper, both protocols, TCP and UDP are compared based on the throughput of packets delivered from one node to the other constrained to the condition that for a certain interval of time the link fails and the simulation time remains the same for either of the protocols. Overall,
... Show MoreHalf of the oil production of the worldwide is a result of the water flooding project. But the main concern of this process is mobility control of the injected fluid, because the unfavorable mobility ratio leads to fingering effect. Adding polymer to the injection water increase the water viscosity, therefore, the displacement will be more stable and have a greater sweep efficiency.
Using of polymer flooding has received more attention these days. Polymer has great potential in the Middle East region, especially in reservoir with high temperature and salinity.
The main objective of this work is to show the effect of shear rate, salinity, temperature, polymer concentration on polymer v
... Show MoreSelf-compacting concrete (SCC) is an innovative concrete that does not require vibration for placing and compaction. It is able to flow under its own weight, completely filling formwork and achieving full compaction, even in the presence of congested reinforcement. The effect of external sulfate attack was studied-Es (very sever exposure SO4>10000ppm) according to ACI 318-11. The mix design method of SCC used is according to EFNARC 2002, and then must satisfy the criteria of filling ability, passing ability and segregation resistance. The experimental program focuses to study two different chemical composition of sulfate resistance Portland cement with different percentage of silica fume replacement by weight of cement and W/cm (0.3 and 0.3
... Show More
The mechanism of hydrogen (H2) gas sensor in the range of 50-200 ppm of RF-sputtered annealed zinc oxide (ZnO) and without annealing was studied. The X-ray Diffraction( XRD) results showed that the Zn metal was completely converted to ZnO with a polycrystalline structure. The I–V characteristics of the device (PT/ZnO/Pt) measured at room temperature before and after annealing at 450 oC for4h, from which a linear relationship has been observed. The sensors had a maximum response to H2 at 350 oC for annealing ZnO and showed stable behavior for detecting H2 gases in the range of 50 to 200 ppm. The annealed film exhibited hig |
This work is concerned with the study of the effect of cement types, particularly OPC and SRPC, which are the main cement types manufactured in Iraq. In addition, study the effect of mineral admixtures, which are HRM and SF on the resistance of high performance concrete (HPC) to internal sulphate attack. The HRM is used at (10%) and SF is used at (8 and 10)% as a partial replacement by weight of cement for both types. The percentages of sulphate investigated are (1,2 and 3)% by adding natural gypsum as a partial replacement by weight of fine aggregate. The tests carried out in this work are: compressive strength, flexural strength, ultrasonic pulse velocity, and density at the age of 7, 28, 90 and 120 days.
The r
... Show MoreHydrocarbon displacement at the pore scale is mainly controlled by the wetness properties of the porous media. Consequently, several techniques including nanofluid flooding were implemented to manipulate the wetting behavior of the pore space in oil reservoirs. This study thus focuses on monitoring the displacement of oil from artificial glass porous media, as a representative for sandstone reservoirs, before and after nanofluid flooding. Experiments were conducted at various temperatures (25 – 50° C), nanoparticles concentrations (0.001 – 0.05 wt% SiO2 NPs), salinity (0.1 – 2 wt% NaCl), and flooding time. Images were taken via a high-resolution microscopic camera and analyzed to investigate the displacement of the oil at dif
... Show MoreHydrocarbon displacement at the pore scale is mainly controlled by the wetness properties of the porous media. Consequently, several techniques including nanofluid flooding were implemented to manipulate the wetting behavior of the pore space in oil reservoirs. This study thus focuses on monitoring the displacement of oil from artificial glass porous media, as a representative for sandstone reservoirs, before and after nanofluid flooding. Experiments were conducted at various temperatures (25 – 50° C), nanoparticles concentrations (0.001 – 0.05 wt% SiO2 NPs), salinity (0.1 – 2 wt% NaCl), and flooding time. Images were taken via a high-resolution microscopic camera and analyzed to investigate the displacement of the oil
... Show More