On Consensus and Stability under Denial-of-Service Attacks [PDF]
In the paper, discrete-time multi-agent systems under Denial-of-Service (DoS) attacks are considered. Since in the presence of DoS attacks the stability of the whole system may be disturbed, sufficient stability conditions for the multi-agent system ...
Ewa Girejko
doaj +2 more sources
A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks [PDF]
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed ...
Mohammed A. Saleh, Azizah Abdul Manaf
doaj +2 more sources
Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey
The potential for being the target of Denial of Service (DoS) attacks is one of the most severe security threats on the Internet. Attackers have been modifying their attack format over the years, damaging specific conditions of operating systems and ...
Vinicius De Miranda Rios +3 more
doaj +3 more sources
DENIAL OF SERVICE ATTACKS [PDF]
This paper describes the most common types of DoS, including the latest one, named Distributed Reflection Denial of Service. The operation of the Internet’s TCP protocol is followed by complete explanation on how several types of DoS work.
Alexandru Enaceanu
core +1 more source
A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing [PDF]
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services).
Adrien Bonguet, Martine Bellaiche
doaj +2 more sources
Optimized CatBoost machine learning (OCML) for DDoS detection in cloud virtual machines with time-series and adversarial robustness [PDF]
Distributed Denial of Service (DDoS) attacks represent one of the most strategically executed and severe threats in cloud computing, often leading to substantial data loss and significant financial damage for both cloud service providers and their users.
Hadeer Samy +3 more
doaj +2 more sources
Understanding and Classifying Permanent Denial-of-Service Attacks
In the evolving landscape of cybersecurity threats, permanent denial-of-service (PDoS) attacks have emerged as a particularly damaging form of cyber aggression.
Stanislav Abaimov
doaj +2 more sources
An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses [PDF]
Ahmet Cetinkaya +2 more
exaly +2 more sources
DENIAL-OF-SERVICE ATTACK ANALYSIS BY MQTT PROTOCOL [PDF]
The paper deals with denial-of-service attacks on the Internet of things networks with the MQTT Protocol. This Protocol is intended for data multicasting, including telemetry, that is why it can be potentially used for denial-of-service attacks. A review
Dmitry I. Dikii
doaj +1 more source
Distributed denial of service attacks [PDF]
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources.
Felix Lau +3 more
openaire +1 more source

