Results 11 to 20 of about 29,505 (203)

Attacking DDoS at the source [PDF]

open access: yes10th IEEE International Conference on Network Protocols, 2002. Proceedings., 2003
Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. We propose D-WARD, a DDoS defense system deployed at source-end networks that autonomously detects and stops attacks originating from these networks. Attacks are detected by the constant monitoring of two-way traffic flows between the network and the rest of the Internet and ...
Jelena Mirkovic   +2 more
openaire   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Detecting DDoS attacks with Hadoop [PDF]

open access: yesProceedings of The ACM CoNEXT Student Workshop, 2011
Recent distributed denial-of-service (DDoS) attacks have demonstrated horrible destructive power by paralyzing web servers within short time. As the volume of Internet traffic rapidly grows up, the current DDoS detection technologies have met a new challenge that should efficiently deal with a huge amount of traffic within the affordable response time.
Yeonhee Lee, Youngseok Lee 0002
openaire   +1 more source

Explainable AI-Based DDOS Attack Identification Method for IoT Networks

open access: yesComputers, 2023
The modern digitized world is mainly dependent on online services. The availability of online systems continues to be seriously challenged by distributed denial of service (DDoS) attacks.
Chathuranga Sampath Kalutharage   +4 more
doaj   +1 more source

Network Protection Against DDoS Attacks

open access: yesInternational Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems, 2015
The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS). The basic types of DDoS attacks and their impact on the protected network are presented here.
Petr Dzurenda   +2 more
doaj   +1 more source

AntibIoTic: Protecting IoT Devices Against DDoS Attacks [PDF]

open access: yes, 2017
The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack.
De Donno, Michele   +3 more
core   +2 more sources

Construction of DDoS attacks malicious behavior knowledge base construction

open access: yesDianxin kexue, 2021
Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed ...
Feiyang LIU   +3 more
doaj   +2 more sources

Impact of Defending Strategy Decision on DDoS Attack

open access: yesComplexity, 2021
Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently.
Chunming Zhang
doaj   +1 more source

DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation [PDF]

open access: yes, 2018
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable ...
De Donno, Michele   +3 more
core   +4 more sources

Home - About - Disclaimer - Privacy