Results 1 to 10 of about 61,931 (258)
Preventing DDoS using Bloom Filter: A Survey
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Ripon Patgiri +2 more
doaj +3 more sources
Machine Learning DDoS Detection for Consumer Internet of Things Devices [PDF]
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Apthorpe, Noah +2 more
core +2 more sources
The Distributed Denial of Service (DDoS) attack has seriously impaired network availability for decades and still there is no effective defense mechanism against it. However, the emerging Software Defined Networking (SDN) provides a new way to reconsider
Shi Dong, Mudar Sarem
doaj +3 more sources
DDoS Mitigation: A Measurement-Based Approach [PDF]
Society heavily relies upon the Internet for global communications. Simultaneously, Internet stability and reliability are continuously subject to deliberate threats. These threats include (Distributed) Denial-of-Service (DDoS) attacks, which can potentially be devastating.
Jonker, Mattijs +2 more
openaire +2 more sources
Rekayasa Fitur Berbasis Machine Learning untuk Mendeteksi Serangan DDoS
Serangan jaringan terdistribusi yang disebut juga dengan distributed denial of service (DDoS) merupakan ancaman dan masalah utama keamanan internet. DDoS adalah serangan pada jaringan yang bertujuan melumpuhkan sumber daya server.
Muhammad Nur Faiz +2 more
doaj +1 more source
AFault Tolerant Multi-Controller Framework for SDN DDoS Attacks Detection [PDF]
Network communication shows a variety of issues with the fast expansion of computer devices, ranging from network administration to traffic engineering. A well-known method for improving these connections is Software-Defined Networking (SDN).
Parisa Valizadeh, Ahmad Taghinezhad-Niar
doaj +1 more source
KS-DDoS: Kafka streams-based classification approach for DDoS attacks [PDF]
A distributed denial of service (DDoS) attack is the most destructive threat for internet-based systems and their resources. It stops the execution of victims by transferring large numbers of network traces. Due to this, legitimate users experience a delay while accessing internet-based systems and their resources. Even a short delay in responses leads
Nilesh Vishwasrao Patil +2 more
openaire +2 more sources
Exact and Approximation Algorithms for Sensor Placement Against DDoS Attacks
In a distributed denial of service (DDoS) attack, the attacker gains control of many network users through a virus. Then the controlled users send many requests to a victim, leading to its resources being depleted. DDoS attacks are hard to defend because
Junosza-Szaniawski Konstanty +2 more
doaj +1 more source
SecHMS- A Secure Hybrid Monitoring Scheme for Cloud Data Monitoring [PDF]
Cloud computing enables the data owners to store and host their data on the cloud storage servers, which is to accessed by data consumers from the cloud storage servers whenever needed.
Anuj Yadav, Ritika Ritika, M. Garg
doaj +1 more source
Analisis Serangan DDoS Menggunakan Metode Jaringan Saraf Tiruan
DDoS attack (Distribute Denial of Service) is one of the weapons of choice from hackers because it’s proven it has become threat on the internet worlds.
M. Alfine Ridho, Molavi Arman
doaj +1 more source

