Results 21 to 30 of about 83,968 (275)

DENIAL-OF-SERVICE ATTACK ANALYSIS BY MQTT PROTOCOL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
The paper deals with denial-of-service attacks on the Internet of things networks with the MQTT Protocol. This Protocol is intended for data multicasting, including telemetry, that is why it can be potentially used for denial-of-service attacks. A review
Dmitry I. Dikii
doaj   +1 more source

Performance assessment of hybrid MTD for DoS mitigation in public cloud

open access: yesInternational Journal of Intelligent Networks, 2021
The massive features of cloud computing makes it as an attractive target in today's business community. Public cloud draws immediate attention among individuals, organizations due to its pay-as-you-go model.
Gayathri Rajakumaran   +1 more
doaj   +1 more source

A Sparse Neural Network Based Control Structure Optimization Game under DoS Attacks for DES Frequency Regulation of Power Grid

open access: yesApplied Sciences, 2019
With the rapid growth of distributed energy sources, power grid has become a flexible and complex networked control system. However, it increases the chances of being a denial-of-service attack, which degrades the performance of the power grid, even ...
Jian Sun, Guanqiu Qi, Zhiqin Zhu
doaj   +1 more source

Real-time DDoS attack detection based on deep learning

open access: yesDianxin kexue, 2017
Distributed denial of service (DDoS) is a special form of denial of service (DoS) attack based on denial of service(DoS).It is a distributed,collaborative large-scale network attack.A DDoS detection method based on deep learning was presented.The method ...
Chuanhuang LI   +5 more
doaj   +2 more sources

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller–A Review

open access: yesIEEE Access, 2020
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh   +4 more
doaj   +1 more source

DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments

open access: yesEnergy Reports, 2023
Smart grid system is evident with control technologies and digital communications systems. The cyber–physical system is a critical infrastructure connected with complex drives and devices.
Mohammad Kamrul Hasan   +5 more
doaj   +1 more source

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

Composite DoS attack model / Jungtinis DoS atakų modelis

open access: yesMokslas: Lietuvos Ateitis, 2012
Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc.
Simona Ramanauskaitė, Antanas Čenys
doaj   +1 more source

Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]

open access: yes, 2003
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J.   +1 more
core   +3 more sources

Detecting Denial of Service attacks using machine learning algorithms

open access: yesJournal of Big Data, 2022
Currently, Distributed Denial of Service Attacks are the most dangerous cyber danger. By inhibiting the server's ability to provide resources to genuine customers, the affected server's resources, such as bandwidth and buffer size, are slowed down.
Kimmi Kumari, M. Mrunalini
doaj   +1 more source

Home - About - Disclaimer - Privacy