Results 21 to 30 of about 185,090 (283)

Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]

open access: yes, 2003
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J.   +1 more
core   +3 more sources

AntibIoTic: Protecting IoT Devices Against DDoS Attacks [PDF]

open access: yes, 2017
The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack.
De Donno, Michele   +3 more
core   +2 more sources

The detection method of low-rate DoS attack based on multi-feature fusion

open access: yesDigital Communications and Networks, 2020
As a new type of Denial of Service (DoS) attacks, the Low-rate Denial of Service (LDoS) attacks make the traditional method of detecting Distributed Denial of Service Attack (DDoS) attacks useless due to the characteristics of a low average rate and ...
Liang Liu   +3 more
doaj   +1 more source

Achieving model explainability for intrusion detection in VANETs with LIME [PDF]

open access: yesPeerJ Computer Science, 2023
Vehicular ad hoc networks (VANETs) are intelligent transport subsystems; vehicles can communicate through a wireless medium in this system. There are many applications of VANETs such as traffic safety and preventing the accident of vehicles. Many attacks
Fayaz Hassan   +5 more
doaj   +2 more sources

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community.
Tasnuva Mahjabin   +3 more
doaj   +1 more source

Non‐fragile H∞ control for LPV‐based CACC systems subject to denial‐of‐service attacks

open access: yesIET Control Theory & Applications, 2021
This paper is concerned with a non‐fragile H∞ state feedback control issue for linear parameter‐varying collaborative adaptive cruise control systems subject to denial‐of‐service attacks.
Cong Huang, Hamid Reza Karimi
doaj   +1 more source

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

AccFlow: Defending against the Low-Rate TCP DoS Attack in Drones

open access: yesApplied Sciences, 2023
As drones are widely employed in various industries and daily life, concerns regarding their safety have been gradually emerging. Denial of service (DoS) attacks have become one of the most significant threats to the stability of resource-constrained ...
Yuan Cao   +5 more
doaj   +1 more source

Keeping Denial-of-Service Attackers in the Dark [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2005
We consider the problem of overcoming (distributed) denial-of-service (DoS) attacks by realistic adversaries that have knowledge of their attack's successfulness, for example, by observing service performance degradation or by eavesdropping on messages or parts thereof.
Gal Badishi, Amir Herzberg, Idit Keidar
openaire   +2 more sources

Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF

open access: yesApplied Sciences, 2023
Kubernetes is an orchestration tool that runs and manages container-based workloads. It works as a collection of different virtual or physical servers that support multiple storage capacities, provide network functionalities, and keep all containerized ...
Amin Sadiq   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy