Results 91 to 100 of about 29,505 (203)
A New Framework for DDoS Attack Detection and Defense in SDN Environment
While software defined network (SDN) brings more innovation to the development of future networks, it also faces a more severe threat from DDoS attacks.
Liang Tan +5 more
doaj +1 more source
An SDNFV-Based DDoS Defense Technology for Smart Cities
A software defined networking (SDN)-enabled smart city is a new paradigm that can effectively improve the cost efficiency and flexibility of data management through data-control separation.
Chuanfeng Xu +4 more
doaj +1 more source
Multi-type low-rate DDoS attack detection method based on hybrid deep learning
Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack ...
Lijuan LI +3 more
doaj
An LDDoS Attack Detection Method Based on Behavioral Characteristics and Stacking Mechanism
Today, the development of the Internet of Things has grown, and the number of related IoT devices has reached the order of tens of billions. Most IoT devices are vulnerable to attacks, especially DdoS (Distributed Denial of Service attack) attacks.
Junwei Ye +4 more
doaj +1 more source
A Note on Analysing the Attacker Aims Behind DDoS Attacks [PDF]
Distributed denial of service (DDoS) attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers.
Abhishta Abhishta +3 more
openaire +2 more sources
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical ...
Saikat Das +3 more
doaj +1 more source
Detecting Different Types of Distributed Denial of Service Attacks
Distributed Denial of Service Attacks (DDoS) threaten every device connected to the Internet. The fast progress and wide spreading DDoS attacks are among the most well-known features of them. Many studies have been conducted to reduce the impact of these
Esra SÖĞÜT +2 more
doaj +1 more source
DDoS Attack Detection and Attacker Identification
DDoS attack is a form of DoS attack in which attacker uses authorized user IP address to attack on a particular victim. Of the two types of attack it falls in the active category. The main aim of the attacker is to jam the resources in order to deny services to the recipient. The attacker can use several strategies to achieve this goal, one of which is
S. K. Jena, Brajesh Kashyap
openaire +1 more source
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S. +2 more
core
Slow TCAM Exhaustion DDoS Attack [PDF]
Software Defined Networks (SDN) facilitate network management by decoupling the data plane which forwards packets using efficient switches from the control plane by leaving the decisions on how packets should be forwarded to a (centralized) controller.
Túlio A. Pascoal +3 more
openaire +1 more source

