Results 91 to 100 of about 26,597 (201)
A Classification Data Packets Using the Threshold Method for Detection of DDoS
Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack.
Sukma Aji +7 more
doaj +1 more source
A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach [PDF]
Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet.
Fang-Yie Leu, I-Long Lin
doaj
Slow TCAM Exhaustion DDoS Attack [PDF]
Software Defined Networks (SDN) facilitate network management by decoupling the data plane which forwards packets using efficient switches from the control plane by leaving the decisions on how packets should be forwarded to a (centralized) controller.
Túlio A. Pascoal +3 more
openaire +1 more source
Fuzzy Observation of DDoS Attack
DDoS attacks are able to block Web servers. Such attacks could be started from anywhere in the network. This chapter presents the possibility of using Ordered Fuzzy Numbers (OFNs) for observation of a DDoS attack. The proposed algorithm could be implemented on routers and predict the moment of the attack.
openaire +1 more source
Real-time DDoS attack detection based on deep learning
Distributed denial of service (DDoS) is a special form of denial of service (DoS) attack based on denial of service(DoS).It is a distributed,collaborative large-scale network attack.A DDoS detection method based on deep learning was presented.The method ...
Chuanhuang LI +5 more
doaj +2 more sources
Advanced metering infrastructure (AMI) is a key component of new power systems. However, the wide application of heterogeneous communication networks and intelligent terminals makes it vulnerable to cyber-attacks.
LIANG Haolan, LIU Dongqi, ZENG Xiangjun, ZHANG Qiong, ZHANG Tao, WANG Rui
doaj +1 more source
Adaptive DDoS attack detection via packet payload feature selection
Distributed Denial of Service attacks (DDoS) are a common and influential network malicious behavior. The timely and accurate detection of Distributed Denial-of-Service (DDoS) attacks constitutes a critically significant research imperative in cyber ...
Fengjun Zhang +6 more
doaj +1 more source
In today’s digitally driven business environment, the continuous operation of online enterprises relies heavily on resilient server infrastructures.
Sajja Ratan Kumar +1 more
doaj +1 more source
The Distributed Denial of Service (DDoS) attack is uncontrollable and appears in different patterns and shapes; accordingly, it is not easily detected and solved with preceding solutions. A DDoS attack is the most serious threat on the Internet.
S. Jayanthi +6 more
doaj +1 more source
DDoS family: A novel perspective for massive types of DDoS attacks
Distributed Denial of Service (DDoS) defense is a profound research problem. In recent years, adversaries tend to complicate their attack strategies by crafting vast DDoS variants. On the one hand, this trend exacerbates both extremes of classification granularity (i.e., binary and attack level) in existing machine learning methods.
Ziming Zhao 0008 +7 more
openaire +2 more sources

