Results 1 to 10 of about 184,991 (184)

On Consensus and Stability under Denial-of-Service Attacks [PDF]

open access: yesEntropy, 2022
In the paper, discrete-time multi-agent systems under Denial-of-Service (DoS) attacks are considered. Since in the presence of DoS attacks the stability of the whole system may be disturbed, sufficient stability conditions for the multi-agent system ...
Ewa Girejko
doaj   +2 more sources

A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks [PDF]

open access: yesThe Scientific World Journal, 2015
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed ...
Mohammed A. Saleh, Azizah Abdul Manaf
doaj   +2 more sources

Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey

open access: yesIEEE Access, 2022
The potential for being the target of Denial of Service (DoS) attacks is one of the most severe security threats on the Internet. Attackers have been modifying their attack format over the years, damaging specific conditions of operating systems and ...
Vinicius De Miranda Rios   +3 more
doaj   +3 more sources

DENIAL OF SERVICE ATTACKS [PDF]

open access: yesJournal of Information Systems & Operations Management, 2007
This paper describes the most common types of DoS, including the latest one, named Distributed Reflection Denial of Service. The operation of the Internet’s TCP protocol is followed by complete explanation on how several types of DoS work.
Alexandru Enaceanu
core   +1 more source

A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing [PDF]

open access: yesFuture Internet, 2017
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services).
Adrien Bonguet, Martine Bellaiche
doaj   +2 more sources

Optimized CatBoost machine learning (OCML) for DDoS detection in cloud virtual machines with time-series and adversarial robustness [PDF]

open access: yesScientific Reports
Distributed Denial of Service (DDoS) attacks represent one of the most strategically executed and severe threats in cloud computing, often leading to substantial data loss and significant financial damage for both cloud service providers and their users.
Hadeer Samy   +3 more
doaj   +2 more sources

Understanding and Classifying Permanent Denial-of-Service Attacks

open access: yesJournal of Cybersecurity and Privacy
In the evolving landscape of cybersecurity threats, permanent denial-of-service (PDoS) attacks have emerged as a particularly damaging form of cyber aggression.
Stanislav Abaimov
doaj   +2 more sources

DENIAL-OF-SERVICE ATTACK ANALYSIS BY MQTT PROTOCOL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2020
The paper deals with denial-of-service attacks on the Internet of things networks with the MQTT Protocol. This Protocol is intended for data multicasting, including telemetry, that is why it can be potentially used for denial-of-service attacks. A review
Dmitry I. Dikii
doaj   +1 more source

Distributed denial of service attacks [PDF]

open access: yesSMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. 'Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions' (Cat. No.00CH37166), 2002
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources.
Felix Lau   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy