Results 41 to 50 of about 26,597 (201)
Fingerprinting Internet DNS Amplification DDoS Activities
This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet ...
Bou-Harb, Elias +2 more
core +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic [PDF]
Recently, a serious disturbance for network security could be a Distributed Denial of Service (DDoS) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety of services and applications that use the ...
Ahmed Khalaf, Bashar
core +1 more source
Protecting web services with service oriented traceback architecture [PDF]
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley +2 more
core +2 more sources
DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks [PDF]
To appear at PAM ...
Daniel Kopp +2 more
openaire +3 more sources
Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi +2 more
wiley +1 more source
Construction of DDoS attacks malicious behavior knowledge base construction
Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed ...
Feiyang LIU +3 more
doaj +2 more sources
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools.
Oluwatobi Shadrach Akanji +2 more
doaj +1 more source
The time for reconstructing the attack graph in DDoS attacks
Despite their frequency, denial-of-service (DoS\blfootnote{Denial of Service (DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking (PPM), coupon collector's problem (CCP)}) and distributed-denial-of-service (DDoS) attacks are difficult to prevent and trace, thus posing a constant threat.
D. Barak-Pelleg, D. Berend
openaire +2 more sources
ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network [PDF]
Recently, D/DoS attacks have been launched by zombie IoT devices in smart home networks. They pose a great threat to to network systems with Application Layer DDoS attacks being especially hard to detect due to their stealth and seemingly legitimacy.
Douligeris, C. +2 more
core +1 more source

