Results 201 to 210 of about 61,931 (258)
Some of the next articles are maybe not open access.

DTL-5G: Deep transfer learning-based DDoS attack detection in 5G and beyond networks

Computer Communications
Network slicing is considered as a key enabler for 5G and beyond mobile networks for supporting a variety of new services, including enhanced mobile broadband, ultra-reliable and low-latency communication, and massive connectivity, on the same physical ...
Behnam Farzaneh   +4 more
semanticscholar   +1 more source

IEEE P2668-Compliant Multi-Layer IoT-DDoS Defense System Using Deep Reinforcement Learning

IEEE transactions on consumer electronics, 2023
The Internet of Things (IoT) has been attracting people to its capability to deal with smart applications. However, with the development of IoT, there are more attacks to threaten IoT systems.
Yucheng Liu   +5 more
semanticscholar   +1 more source

ShieldGPT: An LLM-based Framework for DDoS Mitigation

Asia-Pacific Workshop on Networking
The constantly evolving Distributed Denial of Service (DDoS) attacks pose a significant threat to the cyber realm, which underscores the importance of DDoS mitigation as a pivotal area of research.
Tongze Wang   +5 more
semanticscholar   +1 more source

DDoS Attacks

2016
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire   +1 more source

Detecting DDoS Attack

2021
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G.   +2 more
openaire   +1 more source

Exploring DDoS Mechanisms

Proceedings of the 14th International Conference on Software Technologies, 2019
The concern about cyber security has attracted attention by organizations and public services over the last few years due to the importance of confidentiality, integrity, and availability of services and sensitive data. Many recent episodes of cyber attacks causing strong impact have been performed using extremely simple techniques and taking advantage
Vitor Curtis   +5 more
openaire   +1 more source

DDO-Free XQuery

Proceedings of The 16th International Symposium on Database Programming Languages, 2017
XQuery has an order-sensitive semantics in the sense that it requires nodes to be sorted in document order without duplicates (or in Distinct Document Order, DDO for short). This paper shows that for a given XQuery expression and a nested-relational DTD, the input expression can be transformed into an expression that can be evaluated without ...
Hiroyuki Kato   +2 more
openaire   +1 more source

DDoS tolerant networks

Proceedings DARPA Information Survivability Conference and Exposition, 2004
The nature of the threats posed by distributed denial of service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network.
L. Feinstein   +3 more
openaire   +1 more source

What is DDoS?

2020
This chapter looks at the Distributed Denial of Service (DDoS) attack problem from an attacker's perspective and classify attacks based on how the attack is performed. It investigates DDoS attacks in five classes: Resource Saturation, Exploiting System and/or Network Vulnerabilities, Modification of Configurations, Misuse and Physical Destruction.
Richard R. Brooks, İlker Özçelik
openaire   +1 more source

Commoditising DDoS mitigation

2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016
Current practices in network security deployment require multiple specialised devices as firewalls, traffic shapers, sensors or Intrusion Detection Systems (IDSs) to handle malicious traffic. This practice not only increases the overall operational costs but also makes network administration complicated.
Alfredo Cardigliano   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy