Results 51 to 60 of about 61,931 (258)

Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks

open access: yesIEEE Access
Software-Defined Networking (SDN) offers significant advantages for modern networks, including flexibility, centralized control, and reduced dependency on vendor-specific hardware.
Abdinasir Hirsi   +7 more
semanticscholar   +1 more source

Scalable DDoS Mitigation System for Data Centers

open access: yesAdvances in Electrical and Electronic Engineering, 2015
Distributed Denial of Service attacks (DDoS) have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet.
Zdenek Martinasek
doaj   +1 more source

Defense mechanisms against Distributed Denial of Service attacks:Comparative Review

open access: yesJournal of Information Security and Cybercrimes Research, 2021
Distributed Denial of Service (DDoS) remains a big concern in Cybersecurity. DDoS attacks are implemented to prevent legitimate users from getting access to services.
Fahad Alatawi
doaj   +1 more source

A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs

open access: yesIEEE Transactions on Cognitive Communications and Networking, 2022
Software Defined Networking (SDN) is an emerging network platform, which facilitates centralised network management. The SDN enables the network operators to manage the overall network consistently and holistically, regardless the complexity of ...
M. Sayed   +3 more
semanticscholar   +1 more source

Enhancing DDoS Attack Detection and Mitigation in SDN Using an Ensemble Online Machine Learning Model

open access: yesIEEE Access
Software Defined Networks (SDN) offer dynamic reconfigurability and scalability, revolutionizing traditional networking. However, countering Distributed Denial of Service (DDoS) attacks remains a formidable challenge for both traditional and SDN-based ...
A. Alashhab   +7 more
semanticscholar   +1 more source

Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques

open access: yesItalian National Conference on Sensors
Internet of Things (IoT) technology has become an inevitable part of our daily lives. With the increase in usage of IoT Devices, manufacturers continuously develop IoT technology.
Metehan Gelgi   +4 more
semanticscholar   +1 more source

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain

open access: yes, 2009
In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks.
Gupta, B. B., Joshi, R. C., Misra, Manoj
core   +1 more source

Quantum Computing and Machine Learning for Cybersecurity: Distributed Denial of Service (DDoS) Attack Detection on Smart Micro-Grid

open access: yesEnergies, 2023
Machine learning (ML) is efficiently disrupting and modernizing cities in terms of service quality for mobility, security, robotics, healthcare, electricity, finance, etc. Despite their undeniable success, ML algorithms need crucial computational efforts
Dhaou Said
semanticscholar   +1 more source

Fluorescent Diarylethenes With Polar Groups: Synthesis, Spectra, and Optical Microscopy Applications

open access: yesChemistry – A European Journal, EarlyView.
Blinking green and flashing red: photo‐switchable and photo‐activatable probes emitting green and red light were prepared and applied as bioconjugates in super‐resolution optical microscopy. ABSTRACT The use of photoactivatable fluorescent diarylethenes (fDAEs) in biology‐related light microscopy has been restricted by the lack of probes having freely ...
Kakishi Uno   +6 more
wiley   +1 more source

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking

open access: yesItalian National Conference on Sensors, 2023
Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability.
Abdullah Ahmed Bahashwan   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy