Results 41 to 50 of about 26,597 (201)

Fingerprinting Internet DNS Amplification DDoS Activities

open access: yes, 2013
This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet ...
Bou-Harb, Elias   +2 more
core   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic [PDF]

open access: yes, 2019
Recently, a serious disturbance for network security could be a Distributed Denial of Service (DDoS) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety of services and applications that use the ...
Ahmed Khalaf, Bashar
core   +1 more source

Protecting web services with service oriented traceback architecture [PDF]

open access: yes, 2008
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley   +2 more
core   +2 more sources

DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks [PDF]

open access: yes, 2021
To appear at PAM ...
Daniel Kopp   +2 more
openaire   +3 more sources

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Construction of DDoS attacks malicious behavior knowledge base construction

open access: yesDianxin kexue, 2021
Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed ...
Feiyang LIU   +3 more
doaj   +2 more sources

MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS

open access: yesJournal of ICT, 2021
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools.
Oluwatobi Shadrach Akanji   +2 more
doaj   +1 more source

The time for reconstructing the attack graph in DDoS attacks

open access: yesJournal of Mathematical Analysis and Applications
Despite their frequency, denial-of-service (DoS\blfootnote{Denial of Service (DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking (PPM), coupon collector's problem (CCP)}) and distributed-denial-of-service (DDoS) attacks are difficult to prevent and trace, thus posing a constant threat.
D. Barak-Pelleg, D. Berend
openaire   +2 more sources

ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network [PDF]

open access: yes, 2019
Recently, D/DoS attacks have been launched by zombie IoT devices in smart home networks. They pose a great threat to to network systems with Application Layer DDoS attacks being especially hard to detect due to their stealth and seemingly legitimacy.
Douligeris, C.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy