Results 161 to 170 of about 29,505 (203)
Some of the next articles are maybe not open access.

The Simulation for the SIP DDoS Attack

2009 Fifth International Joint Conference on INC, IMS and IDC, 2009
This study is focus on SIP of VoIP, and simulated and analysised by NS2. In addition, because of the security issues are the main factor to affect its popularization, and the DDOS attack has become one of the more serious issues in VoIP network security domain.
Chung-Hsin Liu, Chun-Lin Lo
openaire   +1 more source

DDoS Attacks in Service Clouds

2015 48th Hawaii International Conference on System Sciences, 2015
The scalability and dynamic configuration of service clouds can be susceptible to Distributed Denial of Service (DDoS) attacks. The attack on web services causes a performance decrease in the cloud applications or can shut them down. Additionally, due to the high distribution of the service cloud components, finding the original attacking service ...
Sarra M. Alqahtani, Rose F. Gamble
openaire   +1 more source

Towards Defeating DDoS Attacks

2012 International Conference on Cyber Security, 2012
Distributed Denial of Service (DDoS) attacks are attacks where a host of compromised systems are used to target a single system. This single system can be either an actual machine or a network resource. What makes these attacks so prevalent and hard to deal with is the fact that they are distributed.
Alex Doyal, Justin Zhan, Huiming Anna Yu
openaire   +1 more source

Counteracting DDoS attacks in WLAN

Proceedings of the 4th international conference on Security of information and networks, 2011
The security protocols for WLAN such as WEP have fundamental weakness which can be exploited by the attacker to obtain unauthorized access to the wireless networks and generate attacks. In this paper, we propose a security architecture for counteracting denial of service attacks in wireless based network architecture with mobile nodes.
Udaya Kiran Tupakula   +2 more
openaire   +1 more source

Preparing for the next DDoS attack

Network Security, 2013
If your network or critical assets were under attack, are you confident that your policies and procedures would be followed? Have you done a ‘fire drill’ to see how your people react and your processes work, or if they work at all? Most likely, you haven't.
openaire   +1 more source

Detecting DDoS Attack

2021
The major network security problems faced by many internet users is the DDoS (distributed denial of service) attack. This attack makes the service inaccessible by exhausting the network and resources with high repudiation and economic loss. It denies the network services to the potential users.
Megala G.   +2 more
openaire   +1 more source

DDoS Attacks

2016
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack.
openaire   +1 more source

A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques

2006
Distributed Denial of Service (DDoS) attack is the greatest security fear for IT managers. With in no time, thousands of vulnerable computers can flood victim website by choking legitimate traffic. Several specific security measurements are deployed to encounter DDoS problem.
Usman Tariq, Manpyo Hong, Kyung-suk Lhee
openaire   +1 more source

Botnet identification in randomized DDoS attacks

2016 24th European Signal Processing Conference (EUSIPCO), 2016
Recent variants of Distributed Denial-of-Service (DDoS) attacks leverage the flexibility of application-layer protocols to disguise malicious activities as normal traffic patterns, while concurrently overwhelming the target destination with a large request rate.
MATTA, Vincenzo   +2 more
openaire   +2 more sources

Classification of DDoS attacks

ACADEMICIA: An International Multidisciplinary Research Journal, 2022
AbstractThis article provides information about DDos attack and its types. Today's popular methods and types of DDos attack are described. There are no universal measures to protect against DDoS attacks, and a complex approach including hardware, software and organizational measures is required to solve such a problem.
openaire   +1 more source

Home - About - Disclaimer - Privacy