Results 21 to 30 of about 26,597 (201)

Statistical Properties of DDoS Attacks

open access: yes2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), 2019
Despite the evolving practical approaches to avoid DDoS attacks, it still poses a thread against information services. This paper aims to aid researchers in DDoS detection field to choose better statistical methods by examining structured probability distribution functions among frequently used traffic features in DDoS detection.
Derya Erhan, Emin Anarim
openaire   +2 more sources

LRDADF: An AI enabled framework for detecting low-rate DDoS attacks in cloud computing environments

open access: yesMeasurement: Sensors, 2023
DDoS attacks, also known as distributed denial-of-service attacks, pose a significant risk to networks in the cloud. The attackers aim to flood the target system with an overwhelming amount of data and requests until it becomes completely overloaded and ...
M.Jahir Pasha   +3 more
doaj   +1 more source

Ddos Attack Detection Simulation and Handling Mechanism [PDF]

open access: yes, 2013
In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop
Sanmorino, A. (Ahmad)   +1 more
core   +3 more sources

Improving Distributed Denial of Service (DDOS) Detection using Entropy Method in Software Defined Network (SDN)

open access: yesComTech, 2017
This research proposed a new method to enhance Distributed Denial of Service (DDoS) detection attack on Software Defined Network (SDN) environment. This research utilized the OpenFlow controller of SDN for DDoS attack detection using modified method and
Maman Abdurohman   +2 more
doaj   +1 more source

Distributed denial-of-service attack detection for smart grid wide area measurement system: A hybrid machine learning technique

open access: yesEnergy Reports, 2023
Smart grid networks face several cyber-attacks, where distributed denial-of-service (DDoS) attacks distract the grid network. The synchrophasor technique protects the wide-area measurement system (WAMS) from the complex problem and addresses different ...
A.K.M. Ahasan Habib   +5 more
doaj   +1 more source

Is it congestion or a DDoS attack? [PDF]

open access: yesIEEE Communications Letters, 2009
We propose a new stealthy DDoS attack model referred to as the "quiet" attack. The attack traffic consists of TCP traffic only. Widely used botnets in today's various attacks and newly introduced network feedback control are integral part of the quiet attack model. We show that shortlived TCP flows can be intentionally misused.
Amey Shevtekar, Nirwan Ansari
openaire   +1 more source

Intrusion detection routers: Design, implementation and evaluation using an experimental testbed [PDF]

open access: yes, 2006
In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed.
Chan, EYK   +20 more
core   +2 more sources

Detection of DDoS Attack

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2023
DOS Attacks or Denial Of Services Attack have become very common amongst Hackers who use them as a path to get fame and respect in the underground groups of the Internet. Denial of Service Attacks basically means denying valid Internet and Network users from using the services of the target network or server.
null Prof. B. V. Jadhav   +4 more
openaire   +1 more source

HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks [PDF]

open access: yes, 2017
Distributed Denial of Service (DDoS) attack sare a frequent cyber attack vector which cause significant damage to computer systems. Hypertext Transfer Protocol(HTTP), which is the core communication protocol of the internet, has had a major upgrade and ...
Beckett, David, Sezer, Sakir
core   +1 more source

BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) Attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
K. Munivara Prasad   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy