Results 161 to 170 of about 29,505 (203)
Some of the next articles are maybe not open access.
The Simulation for the SIP DDoS Attack
2009 Fifth International Joint Conference on INC, IMS and IDC, 2009This study is focus on SIP of VoIP, and simulated and analysised by NS2. In addition, because of the security issues are the main factor to affect its popularization, and the DDOS attack has become one of the more serious issues in VoIP network security domain.
Chung-Hsin Liu, Chun-Lin Lo
openaire +1 more source
DDoS Attacks in Service Clouds
2015 48th Hawaii International Conference on System Sciences, 2015The scalability and dynamic configuration of service clouds can be susceptible to Distributed Denial of Service (DDoS) attacks. The attack on web services causes a performance decrease in the cloud applications or can shut them down. Additionally, due to the high distribution of the service cloud components, finding the original attacking service ...
Sarra M. Alqahtani, Rose F. Gamble
openaire +1 more source
Towards Defeating DDoS Attacks
2012 International Conference on Cyber Security, 2012Distributed Denial of Service (DDoS) attacks are attacks where a host of compromised systems are used to target a single system. This single system can be either an actual machine or a network resource. What makes these attacks so prevalent and hard to deal with is the fact that they are distributed.
Alex Doyal, Justin Zhan, Huiming Anna Yu
openaire +1 more source
Counteracting DDoS attacks in WLAN
Proceedings of the 4th international conference on Security of information and networks, 2011The security protocols for WLAN such as WEP have fundamental weakness which can be exploited by the attacker to obtain unauthorized access to the wireless networks and generate attacks. In this paper, we propose a security architecture for counteracting denial of service attacks in wireless based network architecture with mobile nodes.
Udaya Kiran Tupakula +2 more
openaire +1 more source
Preparing for the next DDoS attack
Network Security, 2013If your network or critical assets were under attack, are you confident that your policies and procedures would be followed? Have you done a ‘fire drill’ to see how your people react and your processes work, or if they work at all? Most likely, you haven't.
openaire +1 more source
2021
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G. +2 more
openaire +1 more source
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G. +2 more
openaire +1 more source
2016
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire +1 more source
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire +1 more source
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques
2006Distributed Denial of Service (DDoS) attack is the greatest security fear for IT managers. With in no time, thousands of vulnerable computers can flood victim website by choking legitimate traffic. Several specific security measurements are deployed to encounter DDoS problem.
Usman Tariq, Manpyo Hong, Kyung-suk Lhee
openaire +1 more source
Botnet identification in randomized DDoS attacks
2016 24th European Signal Processing Conference (EUSIPCO), 2016Recent variants of Distributed Denial-of-Service (DDoS) attacks leverage the flexibility of application-layer protocols to disguise malicious activities as normal traffic patterns, while concurrently overwhelming the target destination with a large request rate.
MATTA, Vincenzo +2 more
openaire +2 more sources
Classification of DDoS attacks
ACADEMICIA: An International Multidisciplinary Research Journal, 2022AbstractThis article provides information about DDos attack and its types. Today's popular methods and types of DDos attack are described. There are no universal measures to protect against DDoS attacks, and a complex approach including hardware, software and organizational measures is required to solve such a problem.
openaire +1 more source

