Results 31 to 40 of about 26,597 (201)

Intelligent feature selection using particle swarm optimization algorithm with a decision tree for DDoS attack detection

open access: yesIJAIN (International Journal of Advances in Intelligent Informatics), 2021
The explosive development of information technology is increasingly rising cyber-attacks. Distributed denial of service (DDoS) attack is a malicious threat to the modern cyber-security world, which causes performance disruption to the network servers. It
Aween Abubakr Saeed   +1 more
doaj   +1 more source

DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation [PDF]

open access: yes, 2018
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable ...
De Donno, Michele   +3 more
core   +4 more sources

The Aftermath of the Dyn DDOS Attack [PDF]

open access: yesIEEE Micro, 2019
Nobody knows who organized the attack. The program hijacked many cameras and home devices, and redirected them to engineer a series of distributed denial of server (DDOS) attacks on a few hours apart, all on 21 October 2016. By executing this novel and rather clever hijack of many devices for a DDOS attack, the attack exposed an important vulnerability
openaire   +1 more source

A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors

open access: yesApplied Sciences, 2019
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks.
Jian Zhang, Qidi Liang, Rui Jiang, Xi Li
doaj   +1 more source

Preventing DDoS using Bloom Filter: A Survey

open access: yes, 2018
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Borgohain, Samir Kumar   +2 more
core   +1 more source

Real-time DDoS attack detection for Cisco IOS using NetFlow [PDF]

open access: yes, 2015
Flow-based DDoS attack detection is typically performed by analysis applications that are installed on or close to a flow collector. Although this approach allows for easy deployment, it makes detection far from real-time and susceptible to DDoS attacks ...
Hofstede, Rick   +3 more
core   +4 more sources

Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud

open access: yesIEEE Access, 2019
Software-defined networking (SDN) is the key outcome of extensive research efforts over the past few decades toward transforming the Internet infrastructure to be more programmable, configurable, and manageable. However, critical cyber-threats in the SDN-
Trung V. Phan, Minho Park
doaj   +1 more source

The Politics of DDoS Attacks

open access: yesIEEE Distributed Systems Online, 2007
News about distributed-denial-of-service attacks on Estonian government Web sites might have represented more smoke than fire, but it also revealed a new political battlefield. Networking veterans say public officials' accusations can make ad hoc "hacktivism" seem like a state-sponsored attack. When you add porous network defenses and a credulous media,
openaire   +1 more source

Research on low-rate DDoS attack of SDN network in cloud environment

open access: yesTongxin xuebao, 2019
Aiming at the problems of low-rate DDoS attack detection accuracy in cloud SDN network and the lack of unified framework for data plane and control plane low-rate DDoS attack detection and defense,a unified framework for low-rate DDoS attack detection ...
Xingshu CHEN   +4 more
doaj   +2 more sources

On the Efficacy of Live DDoS Detection with Hadoop

open access: yes, 2015
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core   +1 more source

Home - About - Disclaimer - Privacy