Results 21 to 30 of about 503,301 (280)
DENIAL-OF-SERVICE ATTACK ANALYSIS BY MQTT PROTOCOL [PDF]
The paper deals with denial-of-service attacks on the Internet of things networks with the MQTT Protocol. This Protocol is intended for data multicasting, including telemetry, that is why it can be potentially used for denial-of-service attacks. A review
Dmitry I. Dikii
doaj +1 more source
A denial-of-service resistant DHT
We consider the problem of designing scalable and robust information systems based on multiple servers that can survive even massive denial-of-service (DoS) attacks. More precisely, we are focusing on designing a scalable distributed hash table (DHT) that is robust against so-called past insider attacks.
Baruch Awerbuch, Christian Scheideler
openaire +1 more source
Performance assessment of hybrid MTD for DoS mitigation in public cloud
The massive features of cloud computing makes it as an attractive target in today's business community. Public cloud draws immediate attention among individuals, organizations due to its pay-as-you-go model.
Gayathri Rajakumaran +1 more
doaj +1 more source
Distributed denial of service attacks [PDF]
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources.
Felix Lau +3 more
openaire +1 more source
MixEth: Efficient, Trustless Coin Mixing Service for Ethereum [PDF]
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains.
, , Buckland, Chris
core +1 more source
With the rapid growth of distributed energy sources, power grid has become a flexible and complex networked control system. However, it increases the chances of being a denial-of-service attack, which degrades the performance of the power grid, even ...
Jian Sun, Guanqiu Qi, Zhiqin Zhu
doaj +1 more source
Smart grid system is evident with control technologies and digital communications systems. The cyber–physical system is a critical infrastructure connected with complex drives and devices.
Mohammad Kamrul Hasan +5 more
doaj +1 more source
Real-time DDoS attack detection based on deep learning
Distributed denial of service (DDoS) is a special form of denial of service (DoS) attack based on denial of service(DoS).It is a distributed,collaborative large-scale network attack.A DDoS detection method based on deep learning was presented.The method ...
Chuanhuang LI +5 more
doaj +2 more sources
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh +4 more
doaj +1 more source
Active router approach to defeating denial-of-service attacks in networks [PDF]
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core +1 more source

