Results 21 to 30 of about 214,208 (273)
Distributed Denial of Service Attack Detection by Expert Systems [PDF]
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi +1 more
doaj +1 more source
RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework
Denial of service and Distributed denial of service (Dos/DDos) attacks continue to be one of the most significant dangers in cybersecurity. Many efforts are being put into developing defenses against these types of attacks.
Nora Rashid Najam +1 more
doaj +1 more source
A Low-Cost Distributed Denial-of-Service Attack Architecture
With the advent of Internet-of-Things (IoT) age, IoT-based distributed denial-of-service (DDoS) attacks have become the mainstream of DDoS attacks. This paper is devoted to exploring the possibility of launching an IoT-based DDoS attack at an extremely ...
Kaifan Huang +4 more
doaj +1 more source
Protecting web services with service oriented traceback architecture [PDF]
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley +2 more
core +2 more sources
Distributed Denial of Service Attacks [PDF]
Distributed Denial-of-Service (DDoS) attacks are the intimidation trials on the Inter-net that deplete the network bandwidth. Researchers have introduced various defense mechanisms including attack prevention, traceback, reaction, detection, and character-ization against DDoS attacks, but the number of these attacks increases every year, and the ideal ...
openaire +2 more sources
Detecting Different Types of Distributed Denial of Service Attacks
Distributed Denial of Service Attacks (DDoS) threaten every device connected to the Internet. The fast progress and wide spreading DDoS attacks are among the most well-known features of them. Many studies have been conducted to reduce the impact of these
Esra SÖĞÜT +2 more
doaj +1 more source
Detecting Denial of Service attacks using machine learning algorithms
Currently, Distributed Denial of Service Attacks are the most dangerous cyber danger. By inhibiting the server's ability to provide resources to genuine customers, the affected server's resources, such as bandwidth and buffer size, are slowed down.
Kimmi Kumari, M. Mrunalini
doaj +1 more source
AntibIoTic: Protecting IoT Devices Against DDoS Attacks [PDF]
The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack.
De Donno, Michele +3 more
core +2 more sources
Klasifikasi Paket Jaringan Berbasis Analisis Statistik dan Neural Network [PDF]
Distributed Denial-of-Service (DDoS) is one of network attack technique which increased every year, especially in both of intensity and volume. DDoS attacks are still one of the world's major Internet threats and become a major problem of cyber-world ...
Harsono, Harsono +2 more
core +4 more sources
With the rapid growth of distributed energy sources, power grid has become a flexible and complex networked control system. However, it increases the chances of being a denial-of-service attack, which degrades the performance of the power grid, even ...
Jian Sun, Guanqiu Qi, Zhiqin Zhu
doaj +1 more source

