Results 161 to 170 of about 40,714 (194)
Some of the next articles are maybe not open access.
DDoS Attacks, New DDoS Taxonomy, And Mitigation Solutions
2023Cloud computing has started to gain acceptance for adoption and implementation among organizations, however, this new technology area has already started to deal with security, performance, and availability challenges. Within Cloud Security issues being paramount for corporates, and private enterprises, the denial of service attacks are rated as the ...
openaire +1 more source
2016
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire +1 more source
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire +1 more source
2021
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G. +2 more
openaire +1 more source
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G. +2 more
openaire +1 more source
Proceedings of the 14th International Conference on Software Technologies, 2019
The concern about cyber security has attracted attention by organizations and public services over the last few years due to the importance of confidentiality, integrity, and availability of services and sensitive data. Many recent episodes of cyber attacks causing strong impact have been performed using extremely simple techniques and taking advantage
Vitor Curtis +5 more
openaire +1 more source
The concern about cyber security has attracted attention by organizations and public services over the last few years due to the importance of confidentiality, integrity, and availability of services and sensitive data. Many recent episodes of cyber attacks causing strong impact have been performed using extremely simple techniques and taking advantage
Vitor Curtis +5 more
openaire +1 more source
Proceedings of The 16th International Symposium on Database Programming Languages, 2017
XQuery has an order-sensitive semantics in the sense that it requires nodes to be sorted in document order without duplicates (or in Distinct Document Order, DDO for short). This paper shows that for a given XQuery expression and a nested-relational DTD, the input expression can be transformed into an expression that can be evaluated without ...
Hiroyuki Kato +2 more
openaire +1 more source
XQuery has an order-sensitive semantics in the sense that it requires nodes to be sorted in document order without duplicates (or in Distinct Document Order, DDO for short). This paper shows that for a given XQuery expression and a nested-relational DTD, the input expression can be transformed into an expression that can be evaluated without ...
Hiroyuki Kato +2 more
openaire +1 more source
Proceedings DARPA Information Survivability Conference and Exposition, 2004
The nature of the threats posed by distributed denial of service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network.
L. Feinstein +3 more
openaire +1 more source
The nature of the threats posed by distributed denial of service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network.
L. Feinstein +3 more
openaire +1 more source
2020
This chapter looks at the Distributed Denial of Service (DDoS) attack problem from an attacker's perspective and classify attacks based on how the attack is performed. It investigates DDoS attacks in five classes: Resource Saturation, Exploiting System and/or Network Vulnerabilities, Modification of Configurations, Misuse and Physical Destruction.
Richard R. Brooks, İlker Özçelik
openaire +1 more source
This chapter looks at the Distributed Denial of Service (DDoS) attack problem from an attacker's perspective and classify attacks based on how the attack is performed. It investigates DDoS attacks in five classes: Resource Saturation, Exploiting System and/or Network Vulnerabilities, Modification of Configurations, Misuse and Physical Destruction.
Richard R. Brooks, İlker Özçelik
openaire +1 more source
2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016
Current practices in network security deployment require multiple specialised devices as firewalls, traffic shapers, sensors or Intrusion Detection Systems (IDSs) to handle malicious traffic. This practice not only increases the overall operational costs but also makes network administration complicated.
Alfredo Cardigliano +2 more
openaire +1 more source
Current practices in network security deployment require multiple specialised devices as firewalls, traffic shapers, sensors or Intrusion Detection Systems (IDSs) to handle malicious traffic. This practice not only increases the overall operational costs but also makes network administration complicated.
Alfredo Cardigliano +2 more
openaire +1 more source
2013
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire +1 more source
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire +1 more source
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud
2015Internet-based computing has lead to an emergence of a large number of threats. One of the major threat is DDoS Distributed Denial of Service attack. Recent incidents have shown that DDoS attacks have the capability of shutting a business not for a day but weeks. DDoS attacks have a greater impact on multi-tenant clouds than traditional infrastructure.
Gaurav Somani +5 more
openaire +1 more source

