Results 1 to 10 of about 40,684 (164)
Preventing DDoS using Bloom Filter: A Survey
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Ripon Patgiri +2 more
doaj +3 more sources
DDoS Mitigation: A Measurement-Based Approach [PDF]
Society heavily relies upon the Internet for global communications. Simultaneously, Internet stability and reliability are continuously subject to deliberate threats. These threats include (Distributed) Denial-of-Service (DDoS) attacks, which can potentially be devastating.
Jonker, Mattijs +2 more
openaire +2 more sources
Rekayasa Fitur Berbasis Machine Learning untuk Mendeteksi Serangan DDoS
Serangan jaringan terdistribusi yang disebut juga dengan distributed denial of service (DDoS) merupakan ancaman dan masalah utama keamanan internet. DDoS adalah serangan pada jaringan yang bertujuan melumpuhkan sumber daya server.
Muhammad Nur Faiz +2 more
doaj +1 more source
KS-DDoS: Kafka streams-based classification approach for DDoS attacks [PDF]
A distributed denial of service (DDoS) attack is the most destructive threat for internet-based systems and their resources. It stops the execution of victims by transferring large numbers of network traces. Due to this, legitimate users experience a delay while accessing internet-based systems and their resources. Even a short delay in responses leads
Nilesh Vishwasrao Patil +2 more
openaire +2 more sources
Exact and Approximation Algorithms for Sensor Placement Against DDoS Attacks
In a distributed denial of service (DDoS) attack, the attacker gains control of many network users through a virus. Then the controlled users send many requests to a victim, leading to its resources being depleted. DDoS attacks are hard to defend because
Junosza-Szaniawski Konstanty +2 more
doaj +1 more source
AFault Tolerant Multi-Controller Framework for SDN DDoS Attacks Detection [PDF]
Network communication shows a variety of issues with the fast expansion of computer devices, ranging from network administration to traffic engineering. A well-known method for improving these connections is Software-Defined Networking (SDN).
Parisa Valizadeh, Ahmad Taghinezhad-Niar
doaj +1 more source
SecHMS- A Secure Hybrid Monitoring Scheme for Cloud Data Monitoring [PDF]
Cloud computing enables the data owners to store and host their data on the cloud storage servers, which is to accessed by data consumers from the cloud storage servers whenever needed.
Anuj Yadav, Ritika Ritika, M. Garg
doaj +1 more source
Analisis Serangan DDoS Menggunakan Metode Jaringan Saraf Tiruan
DDoS attack (Distribute Denial of Service) is one of the weapons of choice from hackers because it’s proven it has become threat on the internet worlds.
M. Alfine Ridho, Molavi Arman
doaj +1 more source
White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets
A new kind of malware called Mirai is spreading like wildfire. Mirai is characterized by targeting Internet of Things (IoT) devices. Since IoT devices are increasing explosively, it is not realistic to manage their vulnerability by human-wave tactics ...
Shingo Yamaguchi
doaj +1 more source
DDOS Botnets Attacks Detection in Anomaly Traffic: A Comparative Study.
One of the major challenges that faces the acceptance and growth rate of business and governmental sites is a Botnet-based DDoS attack. A flooding DDoS strikes a victim machine by means of sending a vast amount of malicious traffic, causing a significant
Ahmed A. Elsherif, أروى الداعج
doaj +1 more source

