Results 31 to 40 of about 61,931 (258)
Cloud computing facilitates the users with on-demand services over the Internet. The services are accessible from anywhere at any time. Despite the valuable services, the paradigm is, also, prone to security issues. A Distributed Denial of Service (DDoS)
Mona A. Alduailij +5 more
semanticscholar +1 more source
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram +1 more
doaj +1 more source
An encryption-encoding architecture for security enhancement in 5G communication networks [PDF]
This article introduces a hybrid architecture of cryptography and coding technique to provide security in 5G communication networks. There are various types of attacks in 5G communication systems.
Das Anwesha +3 more
doaj +1 more source
Protecting web services with service oriented traceback architecture [PDF]
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley +2 more
core +2 more sources
Deep learning approaches for detecting DDoS attacks: a systematic review
In today’s world, technology has become an inevitable part of human life. In fact, during the Covid-19 pandemic, everything from the corporate world to educational institutes has shifted from offline to online.
Meenakshi Mittal +2 more
semanticscholar +1 more source
Distributed-Denial-of-Service impacts are undeniably significant, and because of the development of IoT devices, they are expected to continue to rise in the future.
Abdulkareem A. Hezam +4 more
doaj +1 more source
Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands.
Sheeraz Ahmed +7 more
semanticscholar +1 more source
A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks.
Jian Zhang, Qidi Liang, Rui Jiang, Xi Li
doaj +1 more source
SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis [PDF]
In this paper, we propose a novel approach, called SENATUS, for joint traffic anomaly detection and root-cause analysis. Inspired from the concept of a senate, the key idea of the proposed approach is divided into three stages: election, voting and ...
Abdelkefi, Atef +2 more
core +2 more sources
Explainable AI-Based DDOS Attack Identification Method for IoT Networks
The modern digitized world is mainly dependent on online services. The availability of online systems continues to be seriously challenged by distributed denial of service (DDoS) attacks.
Chathuranga Sampath Kalutharage +4 more
semanticscholar +1 more source

