Results 1 to 10 of about 104,081 (187)

A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks [PDF]

open access: yesThe Scientific World Journal, 2015
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed ...
Mohammed A. Saleh, Azizah Abdul Manaf
doaj   +2 more sources

A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing [PDF]

open access: yesFuture Internet, 2017
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services).
Adrien Bonguet, Martine Bellaiche
doaj   +2 more sources

An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks [PDF]

open access: yesSensors
The Internet of Things (IoT) and blockchain are emerging technologies that have attracted attention in many industries, including healthcare, automotive, and supply chain.
Kithmini Godewatte Arachchige   +2 more
doaj   +2 more sources

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2013
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services.
Saman Taghavi Zargar   +2 more
exaly   +3 more sources

Optimized CatBoost machine learning (OCML) for DDoS detection in cloud virtual machines with time-series and adversarial robustness [PDF]

open access: yesScientific Reports
Distributed Denial of Service (DDoS) attacks represent one of the most strategically executed and severe threats in cloud computing, often leading to substantial data loss and significant financial damage for both cloud service providers and their users.
Hadeer Samy   +3 more
doaj   +2 more sources

ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach

open access: yesInternational Journal of Intelligent Networks, 2023
Distributed Denial of Service (DDoS) attack is one of the most destructive internet network attacks, denying legitimate users access to resources and networks by maliciously blocking available computing resources. Intruders send a large number of packets
P. Krishna Kishore   +2 more
doaj   +1 more source

RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework

open access: yesNTU Journal of Engineering and Technology, 2023
Denial of service and Distributed denial of service (Dos/DDos) attacks continue to be one of the most significant dangers in cybersecurity. Many efforts are being put into developing defenses against these types of attacks.
Nora Rashid Najam   +1 more
doaj   +1 more source

Distributed denial of service attacks [PDF]

open access: yesSMC 2000 Conference Proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics. 'Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions' (Cat. No.00CH37166), 2002
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources.
Felix Lau   +3 more
openaire   +1 more source

A simulation work for generating a novel dataset to detect distributed denial of service attacks on Vehicular Ad hoc NETwork systems

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Vehicular Ad hoc NETwork is a promising technology providing important facilities for modern transportation systems. It has garnered much interest from researchers studying the mitigation of attacks including distributed denial of service attacks ...
Fahd A Alhaidari, Alia Mohammed Alrehan
doaj   +1 more source

Security Attacks on E-Voting System Using Blockchain

open access: yesIraqi Journal for Computer Science and Mathematics, 2023
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each ...
Saba Abdulbaqi Salman   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy