NIDD-enabled lightweight intrusion detection for effective DDoS mitigation in 5G and beyond. [PDF]
Javid I +6 more
europepmc +1 more source
An intelligent deep representation learning with enhanced feature selection approach for cyberattack detection in internet of things enabled cloud environment. [PDF]
Alamro H +7 more
europepmc +1 more source
Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation. [PDF]
Prasad VVSH +6 more
europepmc +1 more source
Federated transfer learning for rare attack class detection in network intrusion detection systems. [PDF]
Sri Abhijit C +3 more
europepmc +1 more source
Nature-inspired swarm optimization paradigms for securing semantic web frameworks against DDoS attacks: a computational approach. [PDF]
Ganguli C +3 more
europepmc +1 more source
DDoS attack detection in intelligent transport systems using adaptive neuro-fuzzy inference system. [PDF]
Usha G +3 more
europepmc +1 more source
Related searches:
Nondeterminism complicates the development and management of distributed systems, and arises from two main sources: the local behavior of each individual node as well as the behavior of the network connecting them. Taming nondeterminism effectively requires dealing with both sources.
Nicholas Hunt +3 more
openaire +1 more source
?????????????????????????? ?????????????? ???????????????????????? ???????? ?????????????????????? ???????????????????? DDoS-???????? ?????????????? ?????? ??????????????? ?????????????? ???? ???????????? ?????????????? ?????????????????? ???????????????????? ???????????????? ?????????????? ???????????????? ???? ?????????????? ??????????.
openaire +4 more sources
Overfort: Combating DDoS with peer-to-peer DDoS puzzle
2008 IEEE International Symposium on Parallel and Distributed Processing, 2008The Internet community has been long convinced that distributed denial-of-service (DDoS) attacks are difficult to combat since IP spoofing prevents traceback to the sources of attacks. Even if traceback is possible, the sheer number of sources that must be shutdown renders trace-back, by itself, ineffective.
null Soon Hin Khor, null Akihiro Nakao
openaire +1 more source
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review, 2004Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space.
Jelena Mirkovic, Peter Reiher
openaire +1 more source

