Results 201 to 210 of about 61,931 (258)
Some of the next articles are maybe not open access.
DTL-5G: Deep transfer learning-based DDoS attack detection in 5G and beyond networks
Computer CommunicationsNetwork slicing is considered as a key enabler for 5G and beyond mobile networks for supporting a variety of new services, including enhanced mobile broadband, ultra-reliable and low-latency communication, and massive connectivity, on the same physical ...
Behnam Farzaneh +4 more
semanticscholar +1 more source
IEEE P2668-Compliant Multi-Layer IoT-DDoS Defense System Using Deep Reinforcement Learning
IEEE transactions on consumer electronics, 2023The Internet of Things (IoT) has been attracting people to its capability to deal with smart applications. However, with the development of IoT, there are more attacks to threaten IoT systems.
Yucheng Liu +5 more
semanticscholar +1 more source
ShieldGPT: An LLM-based Framework for DDoS Mitigation
Asia-Pacific Workshop on NetworkingThe constantly evolving Distributed Denial of Service (DDoS) attacks pose a significant threat to the cyber realm, which underscores the importance of DDoS mitigation as a pivotal area of research.
Tongze Wang +5 more
semanticscholar +1 more source
2016
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire +1 more source
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire +1 more source
2021
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G. +2 more
openaire +1 more source
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G. +2 more
openaire +1 more source
Proceedings of the 14th International Conference on Software Technologies, 2019
The concern about cyber security has attracted attention by organizations and public services over the last few years due to the importance of confidentiality, integrity, and availability of services and sensitive data. Many recent episodes of cyber attacks causing strong impact have been performed using extremely simple techniques and taking advantage
Vitor Curtis +5 more
openaire +1 more source
The concern about cyber security has attracted attention by organizations and public services over the last few years due to the importance of confidentiality, integrity, and availability of services and sensitive data. Many recent episodes of cyber attacks causing strong impact have been performed using extremely simple techniques and taking advantage
Vitor Curtis +5 more
openaire +1 more source
Proceedings of The 16th International Symposium on Database Programming Languages, 2017
XQuery has an order-sensitive semantics in the sense that it requires nodes to be sorted in document order without duplicates (or in Distinct Document Order, DDO for short). This paper shows that for a given XQuery expression and a nested-relational DTD, the input expression can be transformed into an expression that can be evaluated without ...
Hiroyuki Kato +2 more
openaire +1 more source
XQuery has an order-sensitive semantics in the sense that it requires nodes to be sorted in document order without duplicates (or in Distinct Document Order, DDO for short). This paper shows that for a given XQuery expression and a nested-relational DTD, the input expression can be transformed into an expression that can be evaluated without ...
Hiroyuki Kato +2 more
openaire +1 more source
Proceedings DARPA Information Survivability Conference and Exposition, 2004
The nature of the threats posed by distributed denial of service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network.
L. Feinstein +3 more
openaire +1 more source
The nature of the threats posed by distributed denial of service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network.
L. Feinstein +3 more
openaire +1 more source
2020
This chapter looks at the Distributed Denial of Service (DDoS) attack problem from an attacker's perspective and classify attacks based on how the attack is performed. It investigates DDoS attacks in five classes: Resource Saturation, Exploiting System and/or Network Vulnerabilities, Modification of Configurations, Misuse and Physical Destruction.
Richard R. Brooks, İlker Özçelik
openaire +1 more source
This chapter looks at the Distributed Denial of Service (DDoS) attack problem from an attacker's perspective and classify attacks based on how the attack is performed. It investigates DDoS attacks in five classes: Resource Saturation, Exploiting System and/or Network Vulnerabilities, Modification of Configurations, Misuse and Physical Destruction.
Richard R. Brooks, İlker Özçelik
openaire +1 more source
2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016
Current practices in network security deployment require multiple specialised devices as firewalls, traffic shapers, sensors or Intrusion Detection Systems (IDSs) to handle malicious traffic. This practice not only increases the overall operational costs but also makes network administration complicated.
Alfredo Cardigliano +2 more
openaire +1 more source
Current practices in network security deployment require multiple specialised devices as firewalls, traffic shapers, sensors or Intrusion Detection Systems (IDSs) to handle malicious traffic. This practice not only increases the overall operational costs but also makes network administration complicated.
Alfredo Cardigliano +2 more
openaire +1 more source

