Results 11 to 20 of about 185,090 (283)

ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach

open access: yesInternational Journal of Intelligent Networks, 2023
Distributed Denial of Service (DDoS) attack is one of the most destructive internet network attacks, denying legitimate users access to resources and networks by maliciously blocking available computing resources. Intruders send a large number of packets
P. Krishna Kishore   +2 more
doaj   +1 more source

Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World [PDF]

open access: yesInternational Journal of Mathematical, Engineering and Management Sciences, 2019
Distributed Denial of Service (DDoS) attack harms the digital availability in Internet. The user’s perspective of getting quick and effective services may be badly hit by the DDoS attackers.
Rajeev Singh, T. P. Sharma
doaj   +1 more source

Denial-of-Service Attacks on LoRaWAN [PDF]

open access: yesProceedings of the 13th International Conference on Availability, Reliability and Security, 2018
LoRaWAN is the dominant protocol for communication in low-power Wide Area Networks in several European countries, and is being used increasingly in other parts of the world. We identified three vulnerabilities in the LoRaWAN protocol specification that can be used for launching Denial-of-Service (DoS) attacks against end-devices in a LoRaWAN network ...
Eef van Es   +2 more
openaire   +2 more sources

RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework

open access: yesNTU Journal of Engineering and Technology, 2023
Denial of service and Distributed denial of service (Dos/DDos) attacks continue to be one of the most significant dangers in cybersecurity. Many efforts are being put into developing defenses against these types of attacks.
Nora Rashid Najam   +1 more
doaj   +1 more source

A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Vehicular Ad hoc NETwork is a promising technology providing important facilities for modern transportation systems. It has garnered much interest from researchers studying the mitigation of attacks including distributed denial of service attacks ...
Fahd A Alhaidari, Alia Mohammed Alrehan
doaj   +1 more source

A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism

open access: yesEgyptian Informatics Journal, 2021
Software defined networks are an emerging category of networks in which the data plane and control plane are separated. This separation of planes opens the door for designing sophisticated routing algorithms that would overwhelm the computing power of ...
Nada M. AbdelAzim   +3 more
doaj   +1 more source

Generator of Slow Denial-of-Service Cyber Attacks

open access: yesSensors, 2021
In today’s world, the volume of cyber attacks grows every year. These attacks can cause many people or companies high financial losses or loss of private data.
Marek Sikora   +4 more
doaj   +1 more source

Detecting Denial of Service attacks using machine learning algorithms

open access: yesJournal of Big Data, 2022
Currently, Distributed Denial of Service Attacks are the most dangerous cyber danger. By inhibiting the server's ability to provide resources to genuine customers, the affected server's resources, such as bandwidth and buffer size, are slowed down.
Kimmi Kumari, M. Mrunalini
doaj   +1 more source

Preventing flow table overflow against denial of service attack in software defined network

open access: yesTongxin xuebao, 2023
Aiming at denial of service attacks would cause overflow of the limited flow table space of the switch in software defined network, failure to install flow table rules for normal network packets, packet forwarding delay, and packet loss, FloodMitigation ...
Dongbin WANG   +7 more
doaj   +2 more sources

Security Attacks on E-Voting System Using Blockchain

open access: yesIraqi Journal for Computer Science and Mathematics, 2023
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each ...
Saba Abdulbaqi Salman   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy