Results 21 to 30 of about 214,208 (273)

Distributed Denial of Service Attack Detection by Expert Systems [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2016
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi   +1 more
doaj   +1 more source

RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework

open access: yesNTU Journal of Engineering and Technology, 2023
Denial of service and Distributed denial of service (Dos/DDos) attacks continue to be one of the most significant dangers in cybersecurity. Many efforts are being put into developing defenses against these types of attacks.
Nora Rashid Najam   +1 more
doaj   +1 more source

A Low-Cost Distributed Denial-of-Service Attack Architecture

open access: yesIEEE Access, 2020
With the advent of Internet-of-Things (IoT) age, IoT-based distributed denial-of-service (DDoS) attacks have become the mainstream of DDoS attacks. This paper is devoted to exploring the possibility of launching an IoT-based DDoS attack at an extremely ...
Kaifan Huang   +4 more
doaj   +1 more source

Protecting web services with service oriented traceback architecture [PDF]

open access: yes, 2008
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley   +2 more
core   +2 more sources

Distributed Denial of Service Attacks [PDF]

open access: yes, 2021
Distributed Denial-of-Service (DDoS) attacks are the intimidation trials on the Inter-net that deplete the network bandwidth. Researchers have introduced various defense mechanisms including attack prevention, traceback, reaction, detection, and character-ization against DDoS attacks, but the number of these attacks increases every year, and the ideal ...
openaire   +2 more sources

Detecting Different Types of Distributed Denial of Service Attacks

open access: yesGazi Üniversitesi Fen Bilimleri Dergisi, 2021
Distributed Denial of Service Attacks (DDoS) threaten every device connected to the Internet. The fast progress and wide spreading DDoS attacks are among the most well-known features of them. Many studies have been conducted to reduce the impact of these
Esra SÖĞÜT   +2 more
doaj   +1 more source

Detecting Denial of Service attacks using machine learning algorithms

open access: yesJournal of Big Data, 2022
Currently, Distributed Denial of Service Attacks are the most dangerous cyber danger. By inhibiting the server's ability to provide resources to genuine customers, the affected server's resources, such as bandwidth and buffer size, are slowed down.
Kimmi Kumari, M. Mrunalini
doaj   +1 more source

AntibIoTic: Protecting IoT Devices Against DDoS Attacks [PDF]

open access: yes, 2017
The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack.
De Donno, Michele   +3 more
core   +2 more sources

Klasifikasi Paket Jaringan Berbasis Analisis Statistik dan Neural Network [PDF]

open access: yes, 2018
Distributed Denial-of-Service (DDoS) is one of network attack technique which increased every year, especially in both of intensity and volume. DDoS attacks are still one of the world's major Internet threats and become a major problem of cyber-world ...
Harsono, Harsono   +2 more
core   +4 more sources

A Sparse Neural Network Based Control Structure Optimization Game under DoS Attacks for DES Frequency Regulation of Power Grid

open access: yesApplied Sciences, 2019
With the rapid growth of distributed energy sources, power grid has become a flexible and complex networked control system. However, it increases the chances of being a denial-of-service attack, which degrades the performance of the power grid, even ...
Jian Sun, Guanqiu Qi, Zhiqin Zhu
doaj   +1 more source

Home - About - Disclaimer - Privacy