Results 231 to 240 of about 214,208 (273)
Some of the next articles are maybe not open access.

An examination of distributed denial of service attacks

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015
Denial of service (DoS) attacks have been around for a significant period of time and is exponentially growing in popularity. This paper discusses various DoS attacks and the evolution towards distributed denial of service (DDoS) attacks. An analysis of high profile attacks will be conducted to evaluate the methods used by the attackers.
Alex Bartholemy, Weifeng Chen
openaire   +1 more source

Surviving Distributed Denial-of-Service Attacks

IT Professional, 2009
Business organizations and government agencies that depend on an Internet presence but operate without effective DDoS protection mechanisms put their operations at unacceptable risk. Unfortunately, the varieties of DDoS attacks, the incomplete information we have about them, the difficulty of large-scale testing, and the need for a distributed response
openaire   +1 more source

A Service Architecture for Countering Distributed Denial of Service Attacks

21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
We present AMP, a novel service architecture for countering distributed denial of service (dDos) attacks. AMP uses dynamically configured network components to perform traffic monitoring, filtering and detection of commonly known attacks. It does not require universal deployment and is complementary to other schemes for countering dDoS attacks, however
Fareed Zaffar, Gershon Kedem
openaire   +1 more source

Honeypots for distributed denial-of-service attacks

Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003
Distributed denial-of-service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made, but none are successful by themselves. In this paper, we present a system that helps to defend a network from DDoS attacks.
openaire   +1 more source

Critical Investigation of Denial of Service and Distributed Denial of Service Models and Tools

2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 2018
Distributed Denial of Service (DDOS)and Denial of Service (DoS) attacks has become a major threat to steal information over computer networks. Today, mostly hacker launches the attack using DoS, which works on internet based system such as Net banking, defense, government ,e-commerce etc. The purpose of this paper is to perform comparative analysis for
Ankita Sharma, Anshu Bhasin
openaire   +1 more source

Heuristics for Distributed Denial of Services

Asian Journal of Research in Social Sciences and Humanities, 2017
Distributed Denial of Service (DDOS) attacks are common threats to the Internet. Derived from lower layers, novel application layer based DDoSassaults utilize authentic Hyper Text Transfer Protocol (HTTP) queries for overwhelming resources of victims making them hard to detect.
S. Umarani, D. Sharmila
openaire   +1 more source

Scalable traceback against distributed denial of service

International Journal of Web and Grid Services, 2006
Distributed Denial of Service (DDoS) attacks have recently emerged as one of the most potent, if not the greatest, weaknesses of the internet. Previous solutions for this problem try to traceback to the exact origin of the attack by requiring the participation of all routers. For many reasons this requirement is impractical.
Mimoza Durresi   +3 more
openaire   +1 more source

Distributed denial of service attacks and detection mechanisms

Journal of Computational Methods in Sciences and Engineering, 2015
Distributed Denial of Service (DDoS) attack is a coordinated effort between several machines to attack one or multiple target systems. Indeed, the attack is through imposing additional burden on system resources or flood computation and communication resources, the server services for legitimate users, are unavailable.
Marjan Kuchaki Rafsanjani   +1 more
openaire   +1 more source

On the Move: Evading Distributed Denial-of-Service Attacks

Computer, 2016
A proposed moving-target defense against DDoS attacks repeatedly shuffles client-to-server assignments to identify and eventually quarantine malicious clients.
Angelos Stavrou   +2 more
openaire   +1 more source

Distributed state estimation under denial of service

2019 IEEE 58th Conference on Decision and Control (CDC), 2019
This paper investigates the properties of consensus-based distributed state estimation (DSE) in the presence of denial of service (DoS) attacks. The considered model characterizes the DoS attack in terms of its average frequency and duration. It is shown that a family of DSE algorithms, namely Hybrid Consensus on Measurements - Consensus on Information,
Battistelli G.   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy