Results 1 to 10 of about 29,505 (203)

Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey [PDF]

open access: yesSensors, 2022
Internet of Things (IoT) devices are widely used in many industries including smart cities, smart agriculture, smart medical, smart logistics, etc.
Zawar Shah   +2 more
exaly   +4 more sources

Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications [PDF]

open access: yesSensors, 2021
Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of their potential to quickly bring down victims. Memcached vulnerabilities have been targeted by attackers using DDoS amplification attacks. GitHub and Arbor
Nivedita Mishra   +8 more
doaj   +2 more sources

Scalable DDoS Mitigation System for Data Centers [PDF]

open access: yesAdvances in Electrical and Electronic Engineering, 2015
Distributed Denial of Service attacks (DDoS) have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet.
Zdenek Martinasek
doaj   +4 more sources

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2013
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services.
Saman Taghavi Zargar   +2 more
exaly   +3 more sources

LRDADF: An AI enabled framework for detecting low-rate DDoS attacks in cloud computing environments

open access: yesMeasurement: Sensors, 2023
DDoS attacks, also known as distributed denial-of-service attacks, pose a significant risk to networks in the cloud. The attackers aim to flood the target system with an overwhelming amount of data and requests until it becomes completely overloaded and ...
Vasavi Bande
exaly   +3 more sources

HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN. [PDF]

open access: yesPLoS ONE
Software Defined Network (SDN) has alleviated traditional network limitations but faces a significant challenge due to the risk of Distributed Denial of Service (DDoS) attacks against an SDN controller, with current detection methods lacking evaluation ...
Abdullah Ahmed Bahashwan   +6 more
doaj   +2 more sources

Identifying Hybrid DDoS Attacks in Deterministic Machine-to-Machine Networks on a Per-Deterministic-Flow Basis [PDF]

open access: yesMicromachines, 2021
The Deterministic Network (DetNet) is becoming a major feature for 5G and 6G networks to cope with the issue that conventional IT infrastructure cannot efficiently handle latency-sensitive data.
Yen-Hung Chen   +2 more
doaj   +2 more sources

Efficient Detection of DDoS Attacks Using a Hybrid Deep Learning Model with Improved Feature Selection

open access: yesApplied Sciences (Switzerland), 2021
DDoS (Distributed Denial of Service) attacks have now become a serious risk to the integrity and confidentiality of computer networks and systems, which are essential assets in today’s world.
Daniyal Alghazzawi   +2 more
exaly   +3 more sources

DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy

open access: yesEngineering Reports, 2023
Distributed denial of service (DDoS) attacks represent a significant cybersecurity challenge, posing a critical risk to computer networks. Developing an effective defense mechanism against these attacks is crucial but challenging, given their diverse ...
Mohammad Najafimehr   +2 more
doaj   +1 more source

A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors

open access: yesApplied Sciences, 2019
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks.
Jian Zhang, Qidi Liang, Rui Jiang, Xi Li
doaj   +1 more source

Home - About - Disclaimer - Privacy