Results 21 to 30 of about 40,714 (194)
The Distributed Denial of Service (DDoS) attack has seriously impaired network availability for decades and still there is no effective defense mechanism against it. However, the emerging Software Defined Networking (SDN) provides a new way to reconsider
Shi Dong, Mudar Sarem
doaj +1 more source
DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing ...
Mohammad Taufan Asri Zaen +2 more
doaj +1 more source
ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network [PDF]
Recently, D/DoS attacks have been launched by zombie IoT devices in smart home networks. They pose a great threat to to network systems with Application Layer DDoS attacks being especially hard to detect due to their stealth and seemingly legitimacy.
Douligeris, C. +2 more
core +1 more source
Toward Network-based DDoS Detection in Software-defined Networks [PDF]
To combat susceptibility of modern computing systems to cyberattack, identifying and disrupting malicious traffic without human intervention is essential.
Chaves Luciano Jerez +4 more
core +1 more source
Artificial Intelligence in Network Security with Autonomous Threat Response Systems [PDF]
Background: With the continued advance in cyber threats, traditional network security systems offer little returns to organizations. AI has turned out to be a useful technology in improving network security because it proactively identifies and responds ...
Mohammed Abdul Jaleel Maktoof +4 more
doaj +1 more source
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram +1 more
doaj +1 more source
A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks.
Jian Zhang, Qidi Liang, Rui Jiang, Xi Li
doaj +1 more source
The development of computing technology in increasing the accessibility and agility of daily activities currently uses the Internet of Things (IoT). Over time, the increasing number of IoT device users impacts access and delivery of valuable data.
Alam Rahmatulloh +4 more
doaj +1 more source
An encryption-encoding architecture for security enhancement in 5G communication networks [PDF]
This article introduces a hybrid architecture of cryptography and coding technique to provide security in 5G communication networks. There are various types of attacks in 5G communication systems.
Das Anwesha +3 more
doaj +1 more source
Deteksi Serangan DDoS Menggunakan Neural Network dengan Fungsi Fixed Moving Average Window
Distributed denial-of-service (DDoS) merupakan jenis serangan dengan volume, intensitas, dan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi.
Arif Wirawan Muhammad +2 more
doaj +1 more source

