Results 21 to 30 of about 29,505 (203)

Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices

open access: yesIEEE Access, 2019
Application-layer distributed denial of service (AL-DDoS) attacks are becoming critical threats to websites because the stealth of AL-DDoS attacks makes many intrusion prevention systems ineffective.
Huan Lin   +4 more
doaj   +1 more source

Controlled DDoS Attack on IPv4/IPv6 Network Using Distributed Computing Infrastructure

open access: yesJournal of Information and Organizational Sciences, 2020
The paper focuses on design, background and experimental results of real environment of DDoS attacks. The experimental testbed is based on employment of a tool for IT automation to perform DDoS attacks under monitoring.
Michal Čerňanský   +2 more
doaj   +1 more source

Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm

open access: yesSensors, 2023
Internet security is a major concern these days due to the increasing demand for information technology (IT)-based platforms and cloud computing. With its expansion, the Internet has been facing various types of attacks.
Mahrukh Ramzan   +6 more
doaj   +1 more source

Statistical Properties of DDoS Attacks

open access: yes2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), 2019
Despite the evolving practical approaches to avoid DDoS attacks, it still poses a thread against information services. This paper aims to aid researchers in DDoS detection field to choose better statistical methods by examining structured probability distribution functions among frequently used traffic features in DDoS detection.
Derya Erhan, Emin Anarim
openaire   +2 more sources

ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network [PDF]

open access: yes, 2019
Recently, D/DoS attacks have been launched by zombie IoT devices in smart home networks. They pose a great threat to to network systems with Application Layer DDoS attacks being especially hard to detect due to their stealth and seemingly legitimacy.
Douligeris, C.   +2 more
core   +1 more source

Countermeasures against large-scale reflection DDoS attacks using exploit IoT devices

open access: yesAutomatika, 2021
With the of utilizing IoT devices increasing recently, such devices are being infected with malicious codes and being used to carry out DDoS attacks.
Yong-joon Lee   +2 more
doaj   +1 more source

DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS

open access: yesJISA (Jurnal Informatika dan Sains), 2021
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing ...
Mohammad Taufan Asri Zaen   +2 more
doaj   +1 more source

Is it congestion or a DDoS attack? [PDF]

open access: yesIEEE Communications Letters, 2009
We propose a new stealthy DDoS attack model referred to as the "quiet" attack. The attack traffic consists of TCP traffic only. Widely used botnets in today's various attacks and newly introduced network feedback control are integral part of the quiet attack model. We show that shortlived TCP flows can be intentionally misused.
Amey Shevtekar, Nirwan Ansari
openaire   +1 more source

Proactive detection of DDOS attacks in Publish-Subscribe networks [PDF]

open access: yes, 2016
Information centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) or Publish-Subscribe Internet Technology (PURSUIT) has been proposed as an important candidate for the Internet of the future.
Alarfaj, Fawaz   +4 more
core   +2 more sources

Distributed Denial of Service Attack Detection by Expert Systems [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2016
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy