Active Internet Traffic Filtering: Real-time Response to Denial of Service Attacks [PDF]
Denial of Service (DoS) attacks are one of the most challenging threats to Internet security. An attacker typically compromises a large number of vulnerable hosts and uses them to flood the victim's site with malicious traffic, clogging its tail circuit ...
Argyraki, Katerina J. +1 more
core +3 more sources
AntibIoTic: Protecting IoT Devices Against DDoS Attacks [PDF]
The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack.
De Donno, Michele +3 more
core +2 more sources
The detection method of low-rate DoS attack based on multi-feature fusion
As a new type of Denial of Service (DoS) attacks, the Low-rate Denial of Service (LDoS) attacks make the traditional method of detecting Distributed Denial of Service Attack (DDoS) attacks useless due to the characteristics of a low average rate and ...
Liang Liu +3 more
doaj +1 more source
Achieving model explainability for intrusion detection in VANETs with LIME [PDF]
Vehicular ad hoc networks (VANETs) are intelligent transport subsystems; vehicles can communicate through a wireless medium in this system. There are many applications of VANETs such as traffic safety and preventing the accident of vehicles. Many attacks
Fayaz Hassan +5 more
doaj +2 more sources
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community.
Tasnuva Mahjabin +3 more
doaj +1 more source
Non‐fragile H∞ control for LPV‐based CACC systems subject to denial‐of‐service attacks
This paper is concerned with a non‐fragile H∞ state feedback control issue for linear parameter‐varying collaborative adaptive cruise control systems subject to denial‐of‐service attacks.
Cong Huang, Hamid Reza Karimi
doaj +1 more source
Active router approach to defeating denial-of-service attacks in networks [PDF]
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core +1 more source
AccFlow: Defending against the Low-Rate TCP DoS Attack in Drones
As drones are widely employed in various industries and daily life, concerns regarding their safety have been gradually emerging. Denial of service (DoS) attacks have become one of the most significant threats to the stability of resource-constrained ...
Yuan Cao +5 more
doaj +1 more source
Keeping Denial-of-Service Attackers in the Dark [PDF]
We consider the problem of overcoming (distributed) denial-of-service (DoS) attacks by realistic adversaries that have knowledge of their attack's successfulness, for example, by observing service performance degradation or by eavesdropping on messages or parts thereof.
Gal Badishi, Amir Herzberg, Idit Keidar
openaire +2 more sources
Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF
Kubernetes is an orchestration tool that runs and manages container-based workloads. It works as a collection of different virtual or physical servers that support multiple storage capacities, provide network functionalities, and keep all containerized ...
Amin Sadiq +5 more
doaj +1 more source

