Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices
Application-layer distributed denial of service (AL-DDoS) attacks are becoming critical threats to websites because the stealth of AL-DDoS attacks makes many intrusion prevention systems ineffective.
Huan Lin +4 more
doaj +1 more source
Controlled DDoS Attack on IPv4/IPv6 Network Using Distributed Computing Infrastructure
The paper focuses on design, background and experimental results of real environment of DDoS attacks. The experimental testbed is based on employment of a tool for IT automation to perform DDoS attacks under monitoring.
Michal Čerňanský +2 more
doaj +1 more source
Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm
Internet security is a major concern these days due to the increasing demand for information technology (IT)-based platforms and cloud computing. With its expansion, the Internet has been facing various types of attacks.
Mahrukh Ramzan +6 more
doaj +1 more source
Statistical Properties of DDoS Attacks
Despite the evolving practical approaches to avoid DDoS attacks, it still poses a thread against information services. This paper aims to aid researchers in DDoS detection field to choose better statistical methods by examining structured probability distribution functions among frequently used traffic features in DDoS detection.
Derya Erhan, Emin Anarim
openaire +2 more sources
ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network [PDF]
Recently, D/DoS attacks have been launched by zombie IoT devices in smart home networks. They pose a great threat to to network systems with Application Layer DDoS attacks being especially hard to detect due to their stealth and seemingly legitimacy.
Douligeris, C. +2 more
core +1 more source
Countermeasures against large-scale reflection DDoS attacks using exploit IoT devices
With the of utilizing IoT devices increasing recently, such devices are being infected with malicious codes and being used to carry out DDoS attacks.
Yong-joon Lee +2 more
doaj +1 more source
DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing ...
Mohammad Taufan Asri Zaen +2 more
doaj +1 more source
Is it congestion or a DDoS attack? [PDF]
We propose a new stealthy DDoS attack model referred to as the "quiet" attack. The attack traffic consists of TCP traffic only. Widely used botnets in today's various attacks and newly introduced network feedback control are integral part of the quiet attack model. We show that shortlived TCP flows can be intentionally misused.
Amey Shevtekar, Nirwan Ansari
openaire +1 more source
Proactive detection of DDOS attacks in Publish-Subscribe networks [PDF]
Information centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) or Publish-Subscribe Internet Technology (PURSUIT) has been proposed as an important candidate for the Internet of the future.
Alarfaj, Fawaz +4 more
core +2 more sources
Distributed Denial of Service Attack Detection by Expert Systems [PDF]
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi +1 more
doaj +1 more source

