Results 1 to 10 of about 40,684 (164)

Preventing DDoS using Bloom Filter: A Survey

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2018
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Ripon Patgiri   +2 more
doaj   +3 more sources

DDoS Mitigation: A Measurement-Based Approach [PDF]

open access: yesNOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020
Society heavily relies upon the Internet for global communications. Simultaneously, Internet stability and reliability are continuously subject to deliberate threats. These threats include (Distributed) Denial-of-Service (DDoS) attacks, which can potentially be devastating.
Jonker, Mattijs   +2 more
openaire   +2 more sources

Rekayasa Fitur Berbasis Machine Learning untuk Mendeteksi Serangan DDoS

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2022
Serangan jaringan terdistribusi yang disebut juga dengan distributed denial of service (DDoS) merupakan ancaman dan masalah utama keamanan internet. DDoS adalah serangan pada jaringan yang bertujuan melumpuhkan sumber daya server.
Muhammad Nur Faiz   +2 more
doaj   +1 more source

KS-DDoS: Kafka streams-based classification approach for DDoS attacks [PDF]

open access: yesThe Journal of Supercomputing, 2022
A distributed denial of service (DDoS) attack is the most destructive threat for internet-based systems and their resources. It stops the execution of victims by transferring large numbers of network traces. Due to this, legitimate users experience a delay while accessing internet-based systems and their resources. Even a short delay in responses leads
Nilesh Vishwasrao Patil   +2 more
openaire   +2 more sources

Exact and Approximation Algorithms for Sensor Placement Against DDoS Attacks

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2022
In a distributed denial of service (DDoS) attack, the attacker gains control of many network users through a virus. Then the controlled users send many requests to a victim, leading to its resources being depleted. DDoS attacks are hard to defend because
Junosza-Szaniawski Konstanty   +2 more
doaj   +1 more source

AFault Tolerant Multi-Controller Framework for SDN DDoS Attacks Detection [PDF]

open access: yesInternational Journal of Web Research, 2022
Network communication shows a variety of issues with the fast expansion of computer devices, ranging from network administration to traffic engineering. A well-known method for improving these connections is Software-Defined Networking (SDN).
Parisa Valizadeh, Ahmad Taghinezhad-Niar
doaj   +1 more source

SecHMS- A Secure Hybrid Monitoring Scheme for Cloud Data Monitoring [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2021
Cloud computing enables the data owners to store and host their data on the cloud storage servers, which is to accessed by data consumers from the cloud storage servers whenever needed.
Anuj Yadav, Ritika Ritika, M. Garg
doaj   +1 more source

Analisis Serangan DDoS Menggunakan Metode Jaringan Saraf Tiruan

open access: yesJurnal Sisfokom, 2020
DDoS attack (Distribute Denial of Service) is one of the weapons of choice from hackers because it’s proven it has become threat on the internet worlds.
M. Alfine Ridho, Molavi Arman
doaj   +1 more source

White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets

open access: yesSensors, 2020
A new kind of malware called Mirai is spreading like wildfire. Mirai is characterized by targeting Internet of Things (IoT) devices. Since IoT devices are increasing explosively, it is not realistic to manage their vulnerability by human-wave tactics ...
Shingo Yamaguchi
doaj   +1 more source

DDOS Botnets Attacks Detection in Anomaly Traffic: A Comparative Study.

open access: yesJournal of Information Security and Cybercrimes Research, 2020
One of the major challenges that faces the acceptance and growth rate of business and governmental sites is a Botnet-based DDoS attack. A flooding DDoS strikes a victim machine by means of sending a vast amount of malicious traffic, causing a significant
Ahmed A. Elsherif, أروى الداعج
doaj   +1 more source

Home - About - Disclaimer - Privacy