Results 91 to 100 of about 29,505 (203)

A New Framework for DDoS Attack Detection and Defense in SDN Environment

open access: yesIEEE Access, 2020
While software defined network (SDN) brings more innovation to the development of future networks, it also faces a more severe threat from DDoS attacks.
Liang Tan   +5 more
doaj   +1 more source

An SDNFV-Based DDoS Defense Technology for Smart Cities

open access: yesIEEE Access, 2019
A software defined networking (SDN)-enabled smart city is a new paradigm that can effectively improve the cost efficiency and flexibility of data management through data-control separation.
Chuanfeng Xu   +4 more
doaj   +1 more source

Multi-type low-rate DDoS attack detection method based on hybrid deep learning

open access: yes网络与信息安全学报, 2022
Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack ...
Lijuan LI   +3 more
doaj  

An LDDoS Attack Detection Method Based on Behavioral Characteristics and Stacking Mechanism

open access: yesIoT
Today, the development of the Internet of Things has grown, and the number of related IoT devices has reached the order of tens of billions. Most IoT devices are vulnerable to attacks, especially DdoS (Distributed Denial of Service attack) attacks.
Junwei Ye   +4 more
doaj   +1 more source

A Note on Analysing the Attacker Aims Behind DDoS Attacks [PDF]

open access: yes, 2019
Distributed denial of service (DDoS) attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers.
Abhishta Abhishta   +3 more
openaire   +2 more sources

Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks

open access: yesAlgorithms
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical ...
Saikat Das   +3 more
doaj   +1 more source

Detecting Different Types of Distributed Denial of Service Attacks

open access: yesGazi Üniversitesi Fen Bilimleri Dergisi, 2021
Distributed Denial of Service Attacks (DDoS) threaten every device connected to the Internet. The fast progress and wide spreading DDoS attacks are among the most well-known features of them. Many studies have been conducted to reduce the impact of these
Esra SÖĞÜT   +2 more
doaj   +1 more source

DDoS Attack Detection and Attacker Identification

open access: yesInternational Journal of Computer Applications, 2012
DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim. Of the two types of attack it falls in the active category. The main aim of the attacker is to jam the resources in order to deny services to the recipient. The attacker can use several strategies to achieve this goal, one of which is
S. K. Jena, Brajesh Kashyap
openaire   +1 more source

IoT Botnets Analysis [PDF]

open access: yes, 2017
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S.   +2 more
core  

Slow TCAM Exhaustion DDoS Attack [PDF]

open access: yes, 2017
Software Defined Networks (SDN) facilitate network management by decoupling the data plane which forwards packets using efficient switches from the control plane by leaving the decisions on how packets should be forwarded to a (centralized) controller.
Túlio A. Pascoal   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy