Results 41 to 50 of about 29,505 (203)

Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis

open access: yesApplied Sciences, 2023
Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic features that allow network operators to monitor their networks and efficiently manage them. However,
Mohammad Adnan Aladaileh   +6 more
doaj   +1 more source

Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds

open access: yesEURASIP Journal on Information Security, 2018
Distributed computing technology is widely used by Internet-based business applications. Supply chain management (SCM), customer relationship management (CRM), e-Commerce, and banking are some of the applications employing distributed computing.
Jaideep Gera, Bhanu Prakash Battula
doaj   +1 more source

ANALYSING MALICIOUS SOFTWARE SUPPORTING DDOS ATTACKS ON IOT NETWORKS

open access: yesInformation and Telecommunication Sciences
Background. With the proliferation of Internet of Things (IoT) networks in the digital age, the risk of cyberattacks, especially DDoS attacks, is also increasing.
Валерій Правило   +1 more
doaj   +1 more source

The proposed hybrid deep learning intrusion prediction IoT (HDLIP-IoT) framework.

open access: yesPLoS ONE, 2022
Throughout the past few years, the Internet of Things (IoT) has grown in popularity because of its ease of use and flexibility. Cyber criminals are interested in IoT because it offers a variety of benefits for users, but it still poses many types of ...
Magdy M Fadel   +4 more
doaj   +1 more source

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain

open access: yes, 2009
In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks.
Gupta, B. B., Joshi, R. C., Misra, Manoj
core   +1 more source

DoS and DDoS Attack Detection in IoT Infrastructure using Xception Model with Explainability

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference
The denial of service (DoS) and distributed denial of service (DDoS) attacks are considered the most frequent attacks targeting the Internet of Things (IoT) network infrastructure globally.
Nelly Elsayed   +2 more
doaj   +1 more source

A Low-Cost Distributed Denial-of-Service Attack Architecture

open access: yesIEEE Access, 2020
With the advent of Internet-of-Things (IoT) age, IoT-based distributed denial-of-service (DDoS) attacks have become the mainstream of DDoS attacks. This paper is devoted to exploring the possibility of launching an IoT-based DDoS attack at an extremely ...
Kaifan Huang   +4 more
doaj   +1 more source

SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis [PDF]

open access: yes, 2017
In this paper, we propose a novel approach, called SENATUS, for joint traffic anomaly detection and root-cause analysis. Inspired from the concept of a senate, the key idea of the proposed approach is divided into three stages: election, voting and ...
Abdelkefi, Atef   +2 more
core   +2 more sources

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network

open access: yesIEEE Access, 2020
As the Software Define Network (SDN) adopts centralized control logic, it is vulnerable to various types of Distributed Denial of Service (DDoS) attacks.
Wu Zhijun   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy