Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey [PDF]
Internet of Things (IoT) devices are widely used in many industries including smart cities, smart agriculture, smart medical, smart logistics, etc.
Zawar Shah +2 more
exaly +4 more sources
Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications [PDF]
Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of their potential to quickly bring down victims. Memcached vulnerabilities have been targeted by attackers using DDoS amplification attacks. GitHub and Arbor
Nivedita Mishra +8 more
doaj +2 more sources
Scalable DDoS Mitigation System for Data Centers [PDF]
Distributed Denial of Service attacks (DDoS) have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet.
Zdenek Martinasek
doaj +4 more sources
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks [PDF]
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services.
Saman Taghavi Zargar +2 more
exaly +3 more sources
LRDADF: An AI enabled framework for detecting low-rate DDoS attacks in cloud computing environments
DDoS attacks, also known as distributed denial-of-service attacks, pose a significant risk to networks in the cloud. The attackers aim to flood the target system with an overwhelming amount of data and requests until it becomes completely overloaded and ...
Vasavi Bande
exaly +3 more sources
HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN. [PDF]
Software Defined Network (SDN) has alleviated traditional network limitations but faces a significant challenge due to the risk of Distributed Denial of Service (DDoS) attacks against an SDN controller, with current detection methods lacking evaluation ...
Abdullah Ahmed Bahashwan +6 more
doaj +2 more sources
Identifying Hybrid DDoS Attacks in Deterministic Machine-to-Machine Networks on a Per-Deterministic-Flow Basis [PDF]
The Deterministic Network (DetNet) is becoming a major feature for 5G and 6G networks to cope with the issue that conventional IT infrastructure cannot efficiently handle latency-sensitive data.
Yen-Hung Chen +2 more
doaj +2 more sources
DDoS (Distributed Denial of Service) attacks have now become a serious risk to the integrity and confidentiality of computer networks and systems, which are essential assets in today’s world.
Daniyal Alghazzawi +2 more
exaly +3 more sources
DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy
Distributed denial of service (DDoS) attacks represent a significant cybersecurity challenge, posing a critical risk to computer networks. Developing an effective defense mechanism against these attacks is crucial but challenging, given their diverse ...
Mohammad Najafimehr +2 more
doaj +1 more source
A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks.
Jian Zhang, Qidi Liang, Rui Jiang, Xi Li
doaj +1 more source

