Results 241 to 250 of about 214,208 (273)
Some of the next articles are maybe not open access.
Bandwidth Distributed Denial of Service: Attacks and Defenses
IEEE Security & Privacy, 2014The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. So far, BW-DDoS attacks have employed relatively crude, inefficient, brute force mechanisms; future attacks might be significantly more effective and harmful.
Moti Geva, Amir Herzberg, Yehoshua Gev
openaire +1 more source
Distributed Defense Against Distributed Denial-of-Service Attacks
2005Distributed defense is a promising way to neutralize the distributed Denial-of-Service attacks by detecting and responding the attacking sources widespread around the Internet. Components of the distributed defense system will cooperate with each other to combat the attacks. Compared with the centralized defense systems, distributed defense systems can
Wei Shi +2 more
openaire +1 more source
Distributed denial-of-service attacks against HTTP/2 services
Cluster Computing, 2016HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor.
Erwin Adi +3 more
openaire +1 more source
Autonomic Response to Distributed Denial of Service Attacks
2001The Cooperative Intrusion Traceback and Response Architecture (CITRA) [1] and the Intruder Detection and Isolation Protocol (IDIP) [2] provide an infrastructure that enables intrusion detection systems, firewalls, routers, and other components to cooperatively trace and block network intrusions as close to their sources as possible.
Daniel F. Sterne +6 more
openaire +1 more source
Internet of Things and Distributed Denial of Service Mitigation
2017Concerns about security on the Internet of Things (IoT) cover data privacy and integrity, access control and availability. IoT abuse in distributed denial of service (DDoS) attacks is a major issue, as the limited computing, communications, and power resources of typical IoT devices are prioritised in implementing functionality rather than security ...
Mohammed AlSaudi Ali +2 more
openaire +1 more source
Protection Tool for Distributed Denial of Services Attack
2014This article presents a potential tool for solving one of the biggest problems of security of network resources in computer networks. This problem are the Distributed Denial of Service attacks, which are able to block the computer networks. The authors introduce the nature of the problem and subsequently present a tool which provides a possible ...
Lukasz Apiecionek +2 more
openaire +1 more source
Distributed denial-of-service and intrusion detection
Journal of Network and Computer Applications, 2007Xiaobo Zhou 0002, Cheng-Zhong Xu 0001
openaire +1 more source
Denial-of-Service & Distributed Denial-of-Service on The Internet. [PDF]
Kate Ormiston, Mariki M. Eloff
openaire
Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries
IEEE Transactions on Cybernetics, 2020Wenying Xu +2 more
exaly

