Results 31 to 40 of about 40,714 (194)

Combining Deep Learning Models for Enhancing the Detection of Botnet Attacks in Multiple Sensors Internet of Things Networks

open access: yesJOIV: International Journal on Informatics Visualization, 2021
Distributed-Denial-of-Service impacts are undeniably significant, and because of the development of IoT devices, they are expected to continue to rise in the future.
Abdulkareem A. Hezam   +4 more
doaj   +1 more source

Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking [PDF]

open access: yes, 2013
Content-Centric Networking (CCN) is an emerging networking paradigm being considered as a possible replacement for the current IP-based host-centric Internet infrastructure. In CCN, named content becomes a first-class entity.
Compagno, Alberto   +3 more
core   +3 more sources

ANALISIS STATISTIK LOG JARINGAN UNTUK DETEKSI SERANGAN DDOS BERBASIS NEURAL NETWORK

open access: yesIlkom Jurnal Ilmiah, 2016
Distributed denial-of-service (DDoS) merupakan jenis serangan dengan volume, intensitas, dan biaya mitigasi yang terus meningkat seiring berkembangnya skala organisasi.
Arif Wirawan Muhammad
doaj   +1 more source

Detection and Mitigation of DoS and DDoS Attacks in IoT-Based Stateful SDN: An Experimental Approach

open access: yesSensors, 2020
The expected advent of the Internet of Things (IoT) has triggered a large demand of embedded devices, which envisions the autonomous interaction of sensors and actuators while offering all sort of smart services. However, these IoT devices are limited in
Jesús Galeano-Brajones   +3 more
doaj   +1 more source

On the Efficacy of Live DDoS Detection with Hadoop

open access: yes, 2015
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core   +1 more source

Scalable DDoS Mitigation System for Data Centers

open access: yesAdvances in Electrical and Electronic Engineering, 2015
Distributed Denial of Service attacks (DDoS) have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet.
Zdenek Martinasek
doaj   +1 more source

Defense mechanisms against Distributed Denial of Service attacks:Comparative Review

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Distributed Denial of Service (DDoS) remains a big concern in Cybersecurity. DDoS attacks are implemented to prevent legitimate users from getting access to services.
Fahad Alatawi
doaj   +1 more source

Fingerprinting Internet DNS Amplification DDoS Activities

open access: yes, 2013
This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet ...
Bou-Harb, Elias   +2 more
core   +1 more source

Telephony Denial of Service Defense at Data Plane (TDoSD@DP) [PDF]

open access: yes, 2018
The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an attacker causes a Telephony Denial of Service (TDoS) incident ...
Febro, Aldo   +2 more
core   +2 more sources

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy