Results 161 to 170 of about 26,597 (201)
Some of the next articles are maybe not open access.

Towards Defeating DDoS Attacks

2012 International Conference on Cyber Security, 2012
Distributed Denial of Service (DDoS) attacks are attacks where a host of compromised systems are used to target a single system. This single system can be either an actual machine or a network resource. What makes these attacks so prevalent and hard to deal with is the fact that they are distributed.
Alex Doyal, Justin Zhan, Huiming Anna Yu
openaire   +1 more source

Counteracting DDoS attacks in WLAN

Proceedings of the 4th international conference on Security of information and networks, 2011
The security protocols for WLAN such as WEP have fundamental weakness which can be exploited by the attacker to obtain unauthorized access to the wireless networks and generate attacks. In this paper, we propose a security architecture for counteracting denial of service attacks in wireless based network architecture with mobile nodes.
Udaya Kiran Tupakula   +2 more
openaire   +1 more source

Preparing for the next DDoS attack

Network Security, 2013
If your network or critical assets were under attack, are you confident that your policies and procedures would be followed? Have you done a ‘fire drill’ to see how your people react and your processes work, or if they work at all? Most likely, you haven't.
openaire   +1 more source

Detecting DDoS Attack

2021
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G.   +2 more
openaire   +1 more source

DDoS Attacks

2016
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire   +1 more source

DDoS SourceTracer: An Intelligent Application for DDoS Attack Mitigation in SDN

Computers and Electrical Engineering
Shashank Srivastava, Naziya Aslam
exaly   +2 more sources

A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques

2006
Distributed Denial of Service (DDoS) attack is the greatest security fear for IT managers. With in no time, thousands of vulnerable computers can flood victim website by choking legitimate traffic. Several specific security measurements are deployed to encounter DDoS problem.
Usman Tariq, Manpyo Hong, Kyung-suk Lhee
openaire   +1 more source

Botnet identification in randomized DDoS attacks

2016 24th European Signal Processing Conference (EUSIPCO), 2016
Recent variants of Distributed Denial-of-Service (DDoS) attacks leverage the flexibility of application-layer protocols to disguise malicious activities as normal traffic patterns, while concurrently overwhelming the target destination with a large request rate.
MATTA, Vincenzo   +2 more
openaire   +2 more sources

Classification of DDoS attacks

ACADEMICIA: An International Multidisciplinary Research Journal, 2022
AbstractThis article provides information about DDos attack and its types. Today's popular methods and types of DDos attack are described. There are no universal measures to protect against DDoS attacks, and a complex approach including hardware, software and organizational measures is required to solve such a problem.
openaire   +1 more source

An Overview of DDoS Attacks

2013
In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible ...
openaire   +1 more source

Home - About - Disclaimer - Privacy