Results 21 to 30 of about 503,301 (280)

DENIAL-OF-SERVICE ATTACK ANALYSIS BY MQTT PROTOCOL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
The paper deals with denial-of-service attacks on the Internet of things networks with the MQTT Protocol. This Protocol is intended for data multicasting, including telemetry, that is why it can be potentially used for denial-of-service attacks. A review
Dmitry I. Dikii
doaj   +1 more source

A denial-of-service resistant DHT

open access: yesProceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing, 2007
We consider the problem of designing scalable and robust information systems based on multiple servers that can survive even massive denial-of-service (DoS) attacks. More precisely, we are focusing on designing a scalable distributed hash table (DHT) that is robust against so-called past insider attacks.
Baruch Awerbuch, Christian Scheideler
openaire   +1 more source

Performance assessment of hybrid MTD for DoS mitigation in public cloud

open access: yesInternational Journal of Intelligent Networks, 2021
The massive features of cloud computing makes it as an attractive target in today's business community. Public cloud draws immediate attention among individuals, organizations due to its pay-as-you-go model.
Gayathri Rajakumaran   +1 more
doaj   +1 more source

Distributed denial of service attacks [PDF]

open access: yesSMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. 'Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions' (Cat. No.00CH37166), 2002
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources.
Felix Lau   +3 more
openaire   +1 more source

MixEth: Efficient, Trustless Coin Mixing Service for Ethereum [PDF]

open access: yes, 2020
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains.
, , Buckland, Chris
core   +1 more source

A Sparse Neural Network Based Control Structure Optimization Game under DoS Attacks for DES Frequency Regulation of Power Grid

open access: yesApplied Sciences, 2019
With the rapid growth of distributed energy sources, power grid has become a flexible and complex networked control system. However, it increases the chances of being a denial-of-service attack, which degrades the performance of the power grid, even ...
Jian Sun, Guanqiu Qi, Zhiqin Zhu
doaj   +1 more source

DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments

open access: yesEnergy Reports, 2023
Smart grid system is evident with control technologies and digital communications systems. The cyber–physical system is a critical infrastructure connected with complex drives and devices.
Mohammad Kamrul Hasan   +5 more
doaj   +1 more source

Real-time DDoS attack detection based on deep learning

open access: yesDianxin kexue, 2017
Distributed denial of service (DDoS) is a special form of denial of service (DoS) attack based on denial of service(DoS).It is a distributed,collaborative large-scale network attack.A DDoS detection method based on deep learning was presented.The method ...
Chuanhuang LI   +5 more
doaj   +2 more sources

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller–A Review

open access: yesIEEE Access, 2020
The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from ...
Mohammad A. Aladaileh   +4 more
doaj   +1 more source

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

Home - About - Disclaimer - Privacy