Results 151 to 160 of about 26,597 (201)
Optimized ensemble machine learning model for cyberattack classification in industrial IoT. [PDF]
Alabdullah B, Sankaranarayanan S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
DDoS attack detection and wavelets
Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712), 2004This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered a system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification.
Lan Li, Gyungho Lee
openaire +1 more source
DDoS Attacks Detection with AutoEncoder
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020Although many distributed denial of service (DDoS) attacks detection algorithms have been proposed and even some of them have claimed high detection accuracy, DDoS attacks are still a major problem for network security. The latent and inherent problems of these detection algorithms are 1) Requirement of both normal and attack data for building ...
Kun Yang +3 more
openaire +1 more source
Research on DDoS Attacks in IPv6
Proceedings of the 4th International Conference on Computer Science and Application Engineering, 2020With the gradual replacement of IPv4 by IPv6, Distributed Denial-of-Service (DDoS) attacks that have plagued IPv4 appear in IPv6 more or less, and affect the normal operation of IPv6. However, the current research on how to construct a secure DDoS attack defense system under ipv6 is far away from satisfactory.
Jie Zhong, Xiangning Chen
openaire +1 more source
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review, 2004Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space.
Jelena Mirkovic, Peter L. Reiher
openaire +1 more source
Forensic Model for DDoS Attack
GLOBECOM 2020 - 2020 IEEE Global Communications Conference, 2020Recent trends have shown that botnets have been active since the 1990s. Attackers use newer technologies to damage enterprises and individuals through identity theft, bank fraud, spam campaigns, malware distribution, and distributed denial of service (DDoS) attacks.
Yun Luo +4 more
openaire +1 more source
The Simulation for the SIP DDoS Attack
2009 Fifth International Joint Conference on INC, IMS and IDC, 2009This study is focus on SIP of VoIP, and simulated and analysised by NS2. In addition, because of the security issues are the main factor to affect its popularization, and the DDOS attack has become one of the more serious issues in VoIP network security domain.
Chung-Hsin Liu, Chun-Lin Lo
openaire +1 more source
DDoS Attacks in Service Clouds
2015 48th Hawaii International Conference on System Sciences, 2015The scalability and dynamic configuration of service clouds can be susceptible to Distributed Denial of Service (DDoS) attacks. The attack on web services causes a performance decrease in the cloud applications or can shut them down. Additionally, due to the high distribution of the service cloud components, finding the original attacking service ...
Sarra M. Alqahtani, Rose F. Gamble
openaire +1 more source

