Results 1 to 10 of about 104,081 (187)
A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks [PDF]
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed ...
Mohammed A. Saleh, Azizah Abdul Manaf
doaj +2 more sources
A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing [PDF]
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services).
Adrien Bonguet, Martine Bellaiche
doaj +2 more sources
An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks [PDF]
The Internet of Things (IoT) and blockchain are emerging technologies that have attracted attention in many industries, including healthcare, automotive, and supply chain.
Kithmini Godewatte Arachchige +2 more
doaj +2 more sources
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks [PDF]
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services.
Saman Taghavi Zargar +2 more
exaly +3 more sources
Optimized CatBoost machine learning (OCML) for DDoS detection in cloud virtual machines with time-series and adversarial robustness [PDF]
Distributed Denial of Service (DDoS) attacks represent one of the most strategically executed and severe threats in cloud computing, often leading to substantial data loss and significant financial damage for both cloud service providers and their users.
Hadeer Samy +3 more
doaj +2 more sources
Distributed Denial of Service (DDoS) attack is one of the most destructive internet network attacks, denying legitimate users access to resources and networks by maliciously blocking available computing resources. Intruders send a large number of packets
P. Krishna Kishore +2 more
doaj +1 more source
RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework
Denial of service and Distributed denial of service (Dos/DDos) attacks continue to be one of the most significant dangers in cybersecurity. Many efforts are being put into developing defenses against these types of attacks.
Nora Rashid Najam +1 more
doaj +1 more source
Distributed denial of service attacks [PDF]
We discuss distributed denial of service attacks in the Internet. We were motivated by the widely known February 2000 distributed attacks on Yahoo!, Amazon.com, CNN.com, and other major Web sites. A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from using resources.
Felix Lau +3 more
openaire +1 more source
Vehicular Ad hoc NETwork is a promising technology providing important facilities for modern transportation systems. It has garnered much interest from researchers studying the mitigation of attacks including distributed denial of service attacks ...
Fahd A Alhaidari, Alia Mohammed Alrehan
doaj +1 more source
Security Attacks on E-Voting System Using Blockchain
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each ...
Saba Abdulbaqi Salman +2 more
doaj +1 more source

