Results 11 to 20 of about 26,597 (201)

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Detecting DDoS attacks with Hadoop [PDF]

open access: yesProceedings of The ACM CoNEXT Student Workshop, 2011
Recent distributed denial-of-service (DDoS) attacks have demonstrated horrible destructive power by paralyzing web servers within short time. As the volume of Internet traffic rapidly grows up, the current DDoS detection technologies have met a new challenge that should efficiently deal with a huge amount of traffic within the affordable response time.
Yeonhee Lee, Youngseok Lee 0002
openaire   +1 more source

A Low-Cost Distributed Denial-of-Service Attack Architecture

open access: yesIEEE Access, 2020
With the advent of Internet-of-Things (IoT) age, IoT-based distributed denial-of-service (DDoS) attacks have become the mainstream of DDoS attacks. This paper is devoted to exploring the possibility of launching an IoT-based DDoS attack at an extremely ...
Kaifan Huang   +4 more
doaj   +1 more source

Detection Method of DDoS Attack Based on Software Defined Network and Its Application [PDF]

open access: yesJisuanji gongcheng, 2016
According to the characteristics of Distributed Denial of Service(DDoS) attack and OpenFlow technology,this paper proposes a novel DDoS attack detection method based on Software Defined Network(SDN).It gets flow-table item installed in OpenFlow switch ...
LI Hefei,HUANG Xinli,ZHENG Zhengqi
doaj   +1 more source

Impact of Defending Strategy Decision on DDoS Attack

open access: yesComplexity, 2021
Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently.
Chunming Zhang
doaj   +1 more source

HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

open access: yesApplied Computing and Informatics, 2019
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram   +1 more
doaj   +1 more source

A Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks

open access: yesIEEE Access, 2021
The botnet attack is a multi-stage and the most prevalent cyber-attack in the Internet of Things (IoT) environment that initiates with scanning activity and ends at the distributed denial of service (DDoS) attack.
Faisal Hussain   +7 more
doaj   +1 more source

AntibIoTic: Protecting IoT Devices Against DDoS Attacks [PDF]

open access: yes, 2017
The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack.
De Donno, Michele   +3 more
core   +2 more sources

TaxoDaCML: Taxonomy based Divide and Conquer using machine learning approach for DDoS attack classification

open access: yesInternational Journal of Information Management Data Insights, 2021
Distributed Denial of Service (DDoS) attack is one of the most dangerous attacks that result in bringing down the server(s) and it is essential to classify the exact attack to implement robust security measures.
Onkar Thorat   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy