Results 11 to 20 of about 503,301 (280)

Measuring denial Of service [PDF]

open access: yesProceedings of the 2nd ACM workshop on Quality of protection, 2006
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users, by introducing large delays, excessive losses, and service interruptions. The main goal of DoS defenses is to neutralize this effect, and to quickly and fully restore quality of various services to levels acceptable by the users.
Jelena Mirkovic   +6 more
openaire   +1 more source

A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism

open access: yesEgyptian Informatics Journal, 2021
Software defined networks are an emerging category of networks in which the data plane and control plane are separated. This separation of planes opens the door for designing sophisticated routing algorithms that would overwhelm the computing power of ...
Nada M. AbdelAzim   +3 more
doaj   +1 more source

RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework

open access: yesNTU Journal of Engineering and Technology, 2023
Denial of service and Distributed denial of service (Dos/DDos) attacks continue to be one of the most significant dangers in cybersecurity. Many efforts are being put into developing defenses against these types of attacks.
Nora Rashid Najam   +1 more
doaj   +1 more source

Denial-of-Service Resistance in Key Establishment [PDF]

open access: yes, 2007
Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive ...
Boyd, Colin   +4 more
core   +2 more sources

Preventing flow table overflow against denial of service attack in software defined network

open access: yesTongxin xuebao, 2023
Aiming at denial of service attacks would cause overflow of the limited flow table space of the switch in software defined network, failure to install flow table rules for normal network packets, packet forwarding delay, and packet loss, FloodMitigation ...
Dongbin WANG   +7 more
doaj   +2 more sources

An Efficient Hybrid Protocol Framework for DDoS Attack Detection and Mitigation Using Evolutionary Technique

open access: yesJournal of Telecommunications and Information Technology, 2022
The ever-increasing use of the Internet has created massive amounts network traffic, causing problems related to its scalability, controllability, and manageability.
T. Yerriswamy, Murtugudde Gururaj
doaj   +1 more source

Mitigation of Distributed Denial of Service Attacks in the Cloud

open access: yesCybernetics and Information Technologies, 2017
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups.
Alosaimi Wael   +4 more
doaj   +1 more source

Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks

open access: yesSensors, 2023
The increasing use of Internet of Things (IoT) devices has led to a rise in Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks on these networks.
Basim Ahmad Alabsi   +2 more
doaj   +1 more source

Analysing and attacking the 4-way handshake of IEEE 802.11i standard [PDF]

open access: yes, 2014
The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and the authenticator use the pairwise master key (PMK) to derive a fresh pairwise transient key (PTK).
Alabdulatif, A, Ma, X, Nolle, L
core   +1 more source

Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2019
Distributed Denial of Service (DDoS) attack harms the digital availability in Internet. The user’s perspective of getting quick and effective services may be badly hit by the DDoS attackers.
Rajeev Singh, T. P. Sharma
doaj   +1 more source

Home - About - Disclaimer - Privacy