Results 241 to 250 of about 214,208 (273)
Some of the next articles are maybe not open access.

Bandwidth Distributed Denial of Service: Attacks and Defenses

IEEE Security & Privacy, 2014
The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. So far, BW-DDoS attacks have employed relatively crude, inefficient, brute force mechanisms; future attacks might be significantly more effective and harmful.
Moti Geva, Amir Herzberg, Yehoshua Gev
openaire   +1 more source

Distributed Defense Against Distributed Denial-of-Service Attacks

2005
Distributed defense is a promising way to neutralize the distributed Denial-of-Service attacks by detecting and responding the attacking sources widespread around the Internet. Components of the distributed defense system will cooperate with each other to combat the attacks. Compared with the centralized defense systems, distributed defense systems can
Wei Shi   +2 more
openaire   +1 more source

Distributed denial-of-service attacks against HTTP/2 services

Cluster Computing, 2016
HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor.
Erwin Adi   +3 more
openaire   +1 more source

Autonomic Response to Distributed Denial of Service Attacks

2001
The Cooperative Intrusion Traceback and Response Architecture (CITRA) [1] and the Intruder Detection and Isolation Protocol (IDIP) [2] provide an infrastructure that enables intrusion detection systems, firewalls, routers, and other components to cooperatively trace and block network intrusions as close to their sources as possible.
Daniel F. Sterne   +6 more
openaire   +1 more source

Internet of Things and Distributed Denial of Service Mitigation

2017
Concerns about security on the Internet of Things (IoT) cover data privacy and integrity, access control and availability. IoT abuse in distributed denial of service (DDoS) attacks is a major issue, as the limited computing, communications, and power resources of typical IoT devices are prioritised in implementing functionality rather than security ...
Mohammed AlSaudi Ali   +2 more
openaire   +1 more source

Protection Tool for Distributed Denial of Services Attack

2014
This article presents a potential tool for solving one of the biggest problems of security of network resources in computer networks. This problem are the Distributed Denial of Service attacks, which are able to block the computer networks. The authors introduce the nature of the problem and subsequently present a tool which provides a possible ...
Lukasz Apiecionek   +2 more
openaire   +1 more source

Distributed denial-of-service and intrusion detection

Journal of Network and Computer Applications, 2007
Xiaobo Zhou 0002, Cheng-Zhong Xu 0001
openaire   +1 more source

Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries

IEEE Transactions on Cybernetics, 2020
Wenying Xu   +2 more
exaly  

Home - About - Disclaimer - Privacy