Results 31 to 40 of about 26,597 (201)
The explosive development of information technology is increasingly rising cyber-attacks. Distributed denial of service (DDoS) attack is a malicious threat to the modern cyber-security world, which causes performance disruption to the network servers. It
Aween Abubakr Saeed +1 more
doaj +1 more source
DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation [PDF]
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable ...
De Donno, Michele +3 more
core +4 more sources
The Aftermath of the Dyn DDOS Attack [PDF]
Nobody knows who organized the attack. The program hijacked many cameras and home devices, and redirected them to engineer a series of distributed denial of server (DDOS) attacks on a few hours apart, all on 21 October 2016. By executing this novel and rather clever hijack of many devices for a DDOS attack, the attack exposed an important vulnerability
openaire +1 more source
A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks.
Jian Zhang, Qidi Liang, Rui Jiang, Xi Li
doaj +1 more source
Preventing DDoS using Bloom Filter: A Survey
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Borgohain, Samir Kumar +2 more
core +1 more source
Real-time DDoS attack detection for Cisco IOS using NetFlow [PDF]
Flow-based DDoS attack detection is typically performed by analysis applications that are installed on or close to a flow collector. Although this approach allows for easy deployment, it makes detection far from real-time and susceptible to DDoS attacks ...
Hofstede, Rick +3 more
core +4 more sources
Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud
Software-defined networking (SDN) is the key outcome of extensive research efforts over the past few decades toward transforming the Internet infrastructure to be more programmable, configurable, and manageable. However, critical cyber-threats in the SDN-
Trung V. Phan, Minho Park
doaj +1 more source
News about distributed-denial-of-service attacks on Estonian government Web sites might have represented more smoke than fire, but it also revealed a new political battlefield. Networking veterans say public officials' accusations can make ad hoc "hacktivism" seem like a state-sponsored attack. When you add porous network defenses and a credulous media,
openaire +1 more source
Research on low-rate DDoS attack of SDN network in cloud environment
Aiming at the problems of low-rate DDoS attack detection accuracy in cloud SDN network and the lack of unified framework for data plane and control plane low-rate DDoS attack detection and defense,a unified framework for low-rate DDoS attack detection ...
Xingshu CHEN +4 more
doaj +2 more sources
On the Efficacy of Live DDoS Detection with Hadoop
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core +1 more source

