Results 1 to 10 of about 214,208 (273)

Boğaziçi University distributed denial of service dataset [PDF]

open access: yesData in Brief, 2020
Distributed Denial of Service (DDoS) attacks is one of the most troublesome intrusions for online services on the internet. In general DDoS attacks are divided into two categories as bandwidth depletion and resource depletion attacks.
Derya Erhan, Emin Anarım
doaj   +5 more sources

Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm [PDF]

open access: yesSensors, 2023
Internet security is a major concern these days due to the increasing demand for information technology (IT)-based platforms and cloud computing. With its expansion, the Internet has been facing various types of attacks.
Mahrukh Ramzan   +6 more
doaj   +4 more sources

A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks [PDF]

open access: yesThe Scientific World Journal, 2015
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed ...
Mohammed A. Saleh, Azizah Abdul Manaf
doaj   +6 more sources

Distributed Denial of Service is a Scalability Problem [PDF]

open access: yesACM SIGCOMM Computer Communication Review, 2011
Distributed denial of service attacks are often considered a security problem. While this may be the way to view the problem with today's Internet, new network architectures attempting to address the issue should view it as a scalability problem.
Chung, Yoo
core   +2 more sources

An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment [PDF]

open access: yesSensors, 2023
Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability.
Basheer Riskhan   +6 more
doaj   +2 more sources

A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing [PDF]

open access: yesFuture Internet, 2017
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services).
Adrien Bonguet, Martine Bellaiche
doaj   +2 more sources

ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach

open access: yesInternational Journal of Intelligent Networks, 2023
Distributed Denial of Service (DDoS) attack is one of the most destructive internet network attacks, denying legitimate users access to resources and networks by maliciously blocking available computing resources. Intruders send a large number of packets
P. Krishna Kishore   +2 more
doaj   +3 more sources

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community.
Tasnuva Mahjabin   +3 more
doaj   +2 more sources

Towards Stabilization of Distributed Systems under Denial-of-Service [PDF]

open access: yes2017 IEEE 56th Annual Conference on Decision and Control (CDC), 2017
In this paper, we consider networked distributed systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network.
De Persis, Claudio   +2 more
core   +4 more sources

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2013
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services.
Saman Taghavi Zargar   +2 more
exaly   +3 more sources

Home - About - Disclaimer - Privacy