Results 91 to 100 of about 26,597 (201)

A Classification Data Packets Using the Threshold Method for Detection of DDoS

open access: yesJournal of Innovation Information Technology and Application
Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack.
Sukma Aji   +7 more
doaj   +1 more source

A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2010
Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet.
Fang-Yie Leu, I-Long Lin
doaj  

Slow TCAM Exhaustion DDoS Attack [PDF]

open access: yes, 2017
Software Defined Networks (SDN) facilitate network management by decoupling the data plane which forwards packets using efficient switches from the control plane by leaving the decisions on how packets should be forwarded to a (centralized) controller.
Túlio A. Pascoal   +3 more
openaire   +1 more source

Fuzzy Observation of DDoS Attack

open access: yes, 2017
DDoS attacks are able to block Web servers. Such attacks could be started from anywhere in the network. This chapter presents the possibility of using Ordered Fuzzy Numbers (OFNs) for observation of a DDoS attack. The proposed algorithm could be implemented on routers and predict the moment of the attack.
openaire   +1 more source

Real-time DDoS attack detection based on deep learning

open access: yesDianxin kexue, 2017
Distributed denial of service (DDoS) is a special form of denial of service (DoS) attack based on denial of service(DoS).It is a distributed,collaborative large-scale network attack.A DDoS detection method based on deep learning was presented.The method ...
Chuanhuang LI   +5 more
doaj   +2 more sources

Dynamic Modeling and Optimal Defense Strategy Against DdoS Attacks on Power Advanced Metering Infrastructure

open access: yesShanghai Jiaotong Daxue xuebao
Advanced metering infrastructure (AMI) is a key component of new power systems. However, the wide application of heterogeneous communication networks and intelligent terminals makes it vulnerable to cyber-attacks.
LIANG Haolan, LIU Dongqi, ZENG Xiangjun, ZHANG Qiong, ZHANG Tao, WANG Rui
doaj   +1 more source

Adaptive DDoS attack detection via packet payload feature selection

open access: yesCybersecurity
Distributed Denial of Service attacks (DDoS) are a common and influential network malicious behavior. The timely and accurate detection of Distributed Denial-of-Service (DDoS) attacks constitutes a critically significant research imperative in cyber ...
Fengjun Zhang   +6 more
doaj   +1 more source

Performance Analysis of Machine Learning Techniques for Server Health Monitoring Using Time Series Data Against DDOS Attacks

open access: yesIEEE Access
In today’s digitally driven business environment, the continuous operation of online enterprises relies heavily on resilient server infrastructures.
Sajja Ratan Kumar   +1 more
doaj   +1 more source

Advancements in cyberthreat intelligence through resource exhaustion attack detection using hybrid deep learning with heuristic search algorithms

open access: yesScientific Reports
The Distributed Denial of Service (DDoS) attack is uncontrollable and appears in different patterns and shapes; accordingly, it is not easily detected and solved with preceding solutions. A DDoS attack is the most serious threat on the Internet.
S. Jayanthi   +6 more
doaj   +1 more source

DDoS family: A novel perspective for massive types of DDoS attacks

open access: yesComputers & Security
Distributed Denial of Service (DDoS) defense is a profound research problem. In recent years, adversaries tend to complicate their attack strategies by crafting vast DDoS variants. On the one hand, this trend exacerbates both extremes of classification granularity (i.e., binary and attack level) in existing machine learning methods.
Ziming Zhao 0008   +7 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy