Results 41 to 50 of about 29,505 (203)
Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic features that allow network operators to monitor their networks and efficiently manage them. However,
Mohammad Adnan Aladaileh +6 more
doaj +1 more source
Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds
Distributed computing technology is widely used by Internet-based business applications. Supply chain management (SCM), customer relationship management (CRM), e-Commerce, and banking are some of the applications employing distributed computing.
Jaideep Gera, Bhanu Prakash Battula
doaj +1 more source
ANALYSING MALICIOUS SOFTWARE SUPPORTING DDOS ATTACKS ON IOT NETWORKS
Background. With the proliferation of Internet of Things (IoT) networks in the digital age, the risk of cyberattacks, especially DDoS attacks, is also increasing.
Валерій Правило +1 more
doaj +1 more source
The proposed hybrid deep learning intrusion prediction IoT (HDLIP-IoT) framework.
Throughout the past few years, the Internet of Things (IoT) has grown in popularity because of its ease of use and flexibility. Cyber criminals are interested in IoT because it offers a variety of benefits for users, but it still poses many types of ...
Magdy M Fadel +4 more
doaj +1 more source
An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks.
Gupta, B. B., Joshi, R. C., Misra, Manoj
core +1 more source
DoS and DDoS Attack Detection in IoT Infrastructure using Xception Model with Explainability
The denial of service (DoS) and distributed denial of service (DDoS) attacks are considered the most frequent attacks targeting the Internet of Things (IoT) network infrastructure globally.
Nelly Elsayed +2 more
doaj +1 more source
A Low-Cost Distributed Denial-of-Service Attack Architecture
With the advent of Internet-of-Things (IoT) age, IoT-based distributed denial-of-service (DDoS) attacks have become the mainstream of DDoS attacks. This paper is devoted to exploring the possibility of launching an IoT-based DDoS attack at an extremely ...
Kaifan Huang +4 more
doaj +1 more source
SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis [PDF]
In this paper, we propose a novel approach, called SENATUS, for joint traffic anomaly detection and root-cause analysis. Inspired from the concept of a senate, the key idea of the proposed approach is divided into three stages: election, voting and ...
Abdelkefi, Atef +2 more
core +2 more sources
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network
As the Software Define Network (SDN) adopts centralized control logic, it is vulnerable to various types of Distributed Denial of Service (DDoS) attacks.
Wu Zhijun +4 more
doaj +1 more source

