Results 151 to 160 of about 26,597 (201)

DDoS attack detection and wavelets

Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712), 2004
This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered a system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification.
Lan Li, Gyungho Lee
openaire   +1 more source

DDoS Attacks Detection with AutoEncoder

NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020
Although many distributed denial of service (DDoS) attacks detection algorithms have been proposed and even some of them have claimed high detection accuracy, DDoS attacks are still a major problem for network security. The latent and inherent problems of these detection algorithms are 1) Requirement of both normal and attack data for building ...
Kun Yang   +3 more
openaire   +1 more source

Research on DDoS Attacks in IPv6

Proceedings of the 4th International Conference on Computer Science and Application Engineering, 2020
With the gradual replacement of IPv4 by IPv6, Distributed Denial-of-Service (DDoS) attacks that have plagued IPv4 appear in IPv6 more or less, and affect the normal operation of IPv6. However, the current research on how to construct a secure DDoS attack defense system under ipv6 is far away from satisfactory.
Jie Zhong, Xiangning Chen
openaire   +1 more source

A taxonomy of DDoS attack and DDoS defense mechanisms

ACM SIGCOMM Computer Communication Review, 2004
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space.
Jelena Mirkovic, Peter L. Reiher
openaire   +1 more source

Forensic Model for DDoS Attack

GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 2020
Recent trends have shown that botnets have been active since the 1990s. Attackers use newer technologies to damage enterprises and individuals through identity theft, bank fraud, spam campaigns, malware distribution, and distributed denial of service (DDoS) attacks.
Yun Luo   +4 more
openaire   +1 more source

The Simulation for the SIP DDoS Attack

2009 Fifth International Joint Conference on INC, IMS and IDC, 2009
This study is focus on SIP of VoIP, and simulated and analysised by NS2. In addition, because of the security issues are the main factor to affect its popularization, and the DDOS attack has become one of the more serious issues in VoIP network security domain.
Chung-Hsin Liu, Chun-Lin Lo
openaire   +1 more source

DDoS Attacks in Service Clouds

2015 48th Hawaii International Conference on System Sciences, 2015
The scalability and dynamic configuration of service clouds can be susceptible to Distributed Denial of Service (DDoS) attacks. The attack on web services causes a performance decrease in the cloud applications or can shut them down. Additionally, due to the high distribution of the service cloud components, finding the original attacking service ...
Sarra M. Alqahtani, Rose F. Gamble
openaire   +1 more source

Home - About - Disclaimer - Privacy