Results 161 to 170 of about 26,597 (201)
Some of the next articles are maybe not open access.
Towards Defeating DDoS Attacks
2012 International Conference on Cyber Security, 2012Distributed Denial of Service (DDoS) attacks are attacks where a host of compromised systems are used to target a single system. This single system can be either an actual machine or a network resource. What makes these attacks so prevalent and hard to deal with is the fact that they are distributed.
Alex Doyal, Justin Zhan, Huiming Anna Yu
openaire +1 more source
Counteracting DDoS attacks in WLAN
Proceedings of the 4th international conference on Security of information and networks, 2011The security protocols for WLAN such as WEP have fundamental weakness which can be exploited by the attacker to obtain unauthorized access to the wireless networks and generate attacks. In this paper, we propose a security architecture for counteracting denial of service attacks in wireless based network architecture with mobile nodes.
Udaya Kiran Tupakula +2 more
openaire +1 more source
Preparing for the next DDoS attack
Network Security, 2013If your network or critical assets were under attack, are you confident that your policies and procedures would be followed? Have you done a ‘fire drill’ to see how your people react and your processes work, or if they work at all? Most likely, you haven't.
openaire +1 more source
2021
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G. +2 more
openaire +1 more source
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G. +2 more
openaire +1 more source
2016
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire +1 more source
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire +1 more source
DDoS SourceTracer: An Intelligent Application for DDoS Attack Mitigation in SDN
Computers and Electrical EngineeringShashank Srivastava, Naziya Aslam
exaly +2 more sources
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques
2006Distributed Denial of Service (DDoS) attack is the greatest security fear for IT managers. With in no time, thousands of vulnerable computers can flood victim website by choking legitimate traffic. Several specific security measurements are deployed to encounter DDoS problem.
Usman Tariq, Manpyo Hong, Kyung-suk Lhee
openaire +1 more source
Botnet identification in randomized DDoS attacks
2016 24th European Signal Processing Conference (EUSIPCO), 2016Recent variants of Distributed Denial-of-Service (DDoS) attacks leverage the flexibility of application-layer protocols to disguise malicious activities as normal traffic patterns, while concurrently overwhelming the target destination with a large request rate.
MATTA, Vincenzo +2 more
openaire +2 more sources
Classification of DDoS attacks
ACADEMICIA: An International Multidisciplinary Research Journal, 2022AbstractThis article provides information about DDos attack and its types. Today's popular methods and types of DDos attack are described. There are no universal measures to protect against DDoS attacks, and a complex approach including hardware, software and organizational measures is required to solve such a problem.
openaire +1 more source
2013
In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible ...
openaire +1 more source
In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible ...
openaire +1 more source

