Results 31 to 40 of about 29,505 (203)

Detection of DDoS Attack

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2023
DOS Attacks or Denial Of Services Attack have become very common amongst Hackers who use them as a path to get fame and respect in the underground groups of the Internet. Denial of Service Attacks basically means denying valid Internet and Network users from using the services of the target network or server.
null Prof. B. V. Jadhav   +4 more
openaire   +1 more source

HADEC: Hadoop-based live DDoS detection framework

open access: yesEURASIP Journal on Information Security, 2018
Distributed denial of service (DDoS) flooding attacks are one of the main methods to destroy the availability of critical online services today. These DDoS attacks cannot be prevented ahead of time, and once in place, they overwhelm the victim with huge ...
Sufian Hameed, Usman Ali
doaj   +1 more source

Detection of Unknown DDoS Attacks with Deep Learning and Gaussian Mixture Model

open access: yesApplied Sciences, 2021
DDoS (Distributed Denial of Service) attacks have become a pressing threat to the security and integrity of computer networks and information systems, which are indispensable infrastructures of modern times. The detection of DDoS attacks is a challenging
Chin-Shiuh Shieh   +5 more
doaj   +1 more source

Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS)

open access: yesMATEC Web of Conferences, 2018
Software-defined networkings (SDNs) have grown rapidly in recent years be-cause of SDNs are widely used in managing large area networks and securing networks from Distributed Denial of Services (DDoS) attacks.
AL-Adaileh Mohammad A.   +3 more
doaj   +1 more source

The Aftermath of the Dyn DDOS Attack [PDF]

open access: yesIEEE Micro, 2019
Nobody knows who organized the attack. The program hijacked many cameras and home devices, and redirected them to engineer a series of distributed denial of server (DDOS) attacks on a few hours apart, all on 21 October 2016. By executing this novel and rather clever hijack of many devices for a DDOS attack, the attack exposed an important vulnerability
openaire   +1 more source

Mitigation of Distributed Denial of Service Attacks in the Cloud

open access: yesCybernetics and Information Technologies, 2017
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups.
Alosaimi Wael   +4 more
doaj   +1 more source

Comparison of Feature Selection Methods for DDoS Attacks on Software Defined Networks using Filter-Based, Wrapper-Based and Embedded-Based

open access: yesJOIV: International Journal on Informatics Visualization, 2022
The development of internet technology is growing very rapidly. Moreover, keeping internet users protected from cyberattacks is part of the security challenges. Distributed Denial of Service (DDoS) is a real attack that continues to grow.
M.T. Kurniawan   +2 more
doaj   +1 more source

On the Efficacy of Live DDoS Detection with Hadoop

open access: yes, 2015
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core   +1 more source

A Novel Visualization Method for Detecting DDoS Network Attacks [PDF]

open access: yes, 2010
With the rapid growth of networks in size and complexity, netwok administrators today are facing more and more challenges for protecting their networked computers and other devices from all kinds of attacks.
Che, M   +4 more
core   +1 more source

The Politics of DDoS Attacks

open access: yesIEEE Distributed Systems Online, 2007
News about distributed-denial-of-service attacks on Estonian government Web sites might have represented more smoke than fire, but it also revealed a new political battlefield. Networking veterans say public officials' accusations can make ad hoc "hacktivism" seem like a state-sponsored attack. When you add porous network defenses and a credulous media,
openaire   +1 more source

Home - About - Disclaimer - Privacy