Results 51 to 60 of about 29,505 (203)

DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies

open access: yes, 2016
Distributed Denial-of-Service (DDoS) attacks are usually launched through the $botnet$, an "army" of compromised nodes hidden in the network. Inferential tools for DDoS mitigation should accordingly enable an early and reliable discrimination of the ...
Di Mauro, Mario   +2 more
core   +1 more source

DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks [PDF]

open access: yes, 2021
To appear at PAM ...
Daniel Kopp   +2 more
openaire   +3 more sources

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Machine Learning DDoS Detection for Consumer Internet of Things Devices

open access: yes, 2018
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Apthorpe, Noah   +2 more
core   +1 more source

Protecting web services with service oriented traceback architecture [PDF]

open access: yes, 2008
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley   +2 more
core   +2 more sources

The time for reconstructing the attack graph in DDoS attacks

open access: yesJournal of Mathematical Analysis and Applications
Despite their frequency, denial-of-service (DoS\blfootnote{Denial of Service (DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking (PPM), coupon collector's problem (CCP)}) and distributed-denial-of-service (DDoS) attacks are difficult to prevent and trace, thus posing a constant threat.
D. Barak-Pelleg, D. Berend
openaire   +2 more sources

An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic [PDF]

open access: yes, 2019
Recently, a serious disturbance for network security could be a Distributed Denial of Service (DDoS) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety of services and applications that use the ...
Ahmed Khalaf, Bashar
core   +1 more source

Victimization in DDoS attacks: The role of popularity and industry sector

open access: yesJournal of Information Security and Applications
Distributed denial-of-service (DDoS) attacks may be driven not only by economic motives such as extortion, but also by social or political goals, including hacktivism and state-sponsored operations. Therefore, the monetary value of a target alone does not fully explain why some organizations are more frequently victimized.
Muhammad Yasir Muzayan Haq   +6 more
openaire   +2 more sources

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Hybrid DDoS Detection Framework Using Matching Pursuit Algorithm

open access: yesIEEE Access, 2020
Although a considerable amount of research has been done on DDoS attacks, it still poses a severe threat to many businesses and internet service providers. DDoS attacks commonly generate a high amount of network traffic.
Derya Erhan, Emin Anarim
doaj   +1 more source

Home - About - Disclaimer - Privacy