Results 31 to 40 of about 185,090 (283)

MixEth: Efficient, Trustless Coin Mixing Service for Ethereum [PDF]

open access: yes, 2020
Coin mixing is a prevalent privacy-enhancing technology for cryptocurrency users. In this paper, we present MixEth, which is a trustless coin mixing service for Turing-complete blockchains.
, , Buckland, Chris
core   +1 more source

Research on Switch Control Agent Denial-of-Service Attack in SDN [PDF]

open access: yesJisuanji gongcheng, 2019
Aiming at the shortcomings of limited throughput of Software Defined Networking(SDN) switch control agent,a switch control agent denial-of-service attack method is proposed.To protect the SDN switch control agent resources,a hierarchical multi-threshold ...
DENG Shuhua, LU Zebin, LI Zhengfa, GAO Xieping
doaj   +1 more source

A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS

open access: yesTạp chí Khoa học
Denial-of-service (DoS) attacks on website systems have become increasingly sophisticated. These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive measures.
Vu Thi Phuong*, Nguyen Van Vu, Dang Thi Hien
doaj   +1 more source

Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm

open access: yesSensors, 2023
Internet security is a major concern these days due to the increasing demand for information technology (IT)-based platforms and cloud computing. With its expansion, the Internet has been facing various types of attacks.
Mahrukh Ramzan   +6 more
doaj   +1 more source

Distributed Denial of Service Attack Detection by Expert Systems [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2016
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi   +1 more
doaj   +1 more source

DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation [PDF]

open access: yes, 2018
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable ...
De Donno, Michele   +3 more
core   +4 more sources

Detecting Different Types of Distributed Denial of Service Attacks

open access: yesGazi Üniversitesi Fen Bilimleri Dergisi, 2021
Distributed Denial of Service Attacks (DDoS) threaten every device connected to the Internet. The fast progress and wide spreading DDoS attacks are among the most well-known features of them. Many studies have been conducted to reduce the impact of these
Esra SÖĞÜT   +2 more
doaj   +1 more source

Centralized prevention of denial of service attacks

open access: yes, 2003
The world has come to depend on the Internet at an increasing rate for communication, e-commerce, and many other essential services. As such, the Internet has become an integral part of the workings of society at large.
Sthultz, Michael R
core   +1 more source

Analisis Explotasi Keamanan Web Denial of Service Attack

open access: yesComTech, 2013
Internet network which is public and global is unsafe, so the security of public Internet-based information system needs to be considered. When a data is sent from one computer to another on the Internet, it will pass through a number of other computers
Junita Juwita Siregar
doaj   +1 more source

Automatic proof of resistance of denial of service attacks in protocols

open access: yesTongxin xuebao, 2012
First,the applied PI calculus was extended from two aspects:attacker contexts and process expression,then from the view of protocol state,the protocols were modeled with the extended applied PI calculus and a automatic method of proof of resistance of ...
Bo MENG   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy