Results 21 to 30 of about 26,597 (201)
Statistical Properties of DDoS Attacks
Despite the evolving practical approaches to avoid DDoS attacks, it still poses a thread against information services. This paper aims to aid researchers in DDoS detection field to choose better statistical methods by examining structured probability distribution functions among frequently used traffic features in DDoS detection.
Derya Erhan, Emin Anarim
openaire +2 more sources
LRDADF: An AI enabled framework for detecting low-rate DDoS attacks in cloud computing environments
DDoS attacks, also known as distributed denial-of-service attacks, pose a significant risk to networks in the cloud. The attackers aim to flood the target system with an overwhelming amount of data and requests until it becomes completely overloaded and ...
M.Jahir Pasha +3 more
doaj +1 more source
Ddos Attack Detection Simulation and Handling Mechanism [PDF]
In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop
Sanmorino, A. (Ahmad) +1 more
core +3 more sources
This research proposed a new method to enhance Distributed Denial of Service (DDoS) detection attack on Software Defined Network (SDN) environment. This research utilized the OpenFlow controller of SDN for DDoS attack detection using modified method and
Maman Abdurohman +2 more
doaj +1 more source
Smart grid networks face several cyber-attacks, where distributed denial-of-service (DDoS) attacks distract the grid network. The synchrophasor technique protects the wide-area measurement system (WAMS) from the complex problem and addresses different ...
A.K.M. Ahasan Habib +5 more
doaj +1 more source
Is it congestion or a DDoS attack? [PDF]
We propose a new stealthy DDoS attack model referred to as the "quiet" attack. The attack traffic consists of TCP traffic only. Widely used botnets in today's various attacks and newly introduced network feedback control are integral part of the quiet attack model. We show that shortlived TCP flows can be intentionally misused.
Amey Shevtekar, Nirwan Ansari
openaire +1 more source
Intrusion detection routers: Design, implementation and evaluation using an experimental testbed [PDF]
In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed.
Chan, EYK +20 more
core +2 more sources
DOS Attacks or Denial Of Services Attack have become very common amongst Hackers who use them as a path to get fame and respect in the underground groups of the Internet. Denial of Service Attacks basically means denying valid Internet and Network users from using the services of the target network or server.
null Prof. B. V. Jadhav +4 more
openaire +1 more source
HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks [PDF]
Distributed Denial of Service (DDoS) attack sare a frequent cyber attack vector which cause significant damage to computer systems. Hypertext Transfer Protocol(HTTP), which is the core communication protocol of the internet, has had a major upgrade and ...
Beckett, David, Sezer, Sakir
core +1 more source
BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) Attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
K. Munivara Prasad +2 more
doaj +1 more source

