Results 171 to 180 of about 29,505 (203)
Some of the next articles are maybe not open access.
2013
In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible ...
openaire +1 more source
In this chapter, we firstly review the short history of denial of service (DoS) and distributed denial of service (DDoS) attacks. We further explore the reasons why the current cyberspace is a heaven for cyber criminals, such as DDoS attackers. We present the challenges of the DDoS related research fields from various aspects, and discuss the possible ...
openaire +1 more source
2013
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire +1 more source
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire +1 more source
2016
Billions of people rely on internet to discover and share ideas with the world. However, the websites are vulnerable to deliver the attacks, preventing people to access them. The recent study of global surveys showed that DDoS Attacks evolved in strategy and tactics.
openaire +1 more source
Billions of people rely on internet to discover and share ideas with the world. However, the websites are vulnerable to deliver the attacks, preventing people to access them. The recent study of global surveys showed that DDoS Attacks evolved in strategy and tactics.
openaire +1 more source
Protect Grids from DDoS Attacks
2004Recently a number of highly publicised incidents of Distributed Denial of Service (DDoS) attacks have made people aware of the importance of providing available securely the grids’ data and services to users. This paper introduces the vulnerability of grids to DDoS attacks, and proposes a distributed defense system that has a mixture deployment of sub ...
Yang Xiang 0001, Wanlei Zhou 0001
openaire +1 more source
A novel feature-based framework enabling multi-type DDoS attacks detection
World Wide Web, 2022Lu Zhou, Ye Zhu, Yong Xiang
exaly
International Journal of Computer & Organization Trends, 2014
K. Naresh Kumar, K. Krishna Reddy
openaire +1 more source
K. Naresh Kumar, K. Krishna Reddy
openaire +1 more source
The DDoS attacks detection through machine learning and statistical methods in SDN
Journal of Supercomputing, 2020Afsaneh Banitalebi Dehkordi +2 more
exaly

