Results 91 to 100 of about 117,160 (225)

Cyber secure consensus of fractional order multi-agent systems with distributed delays: Defense strategy against denial-of-service attacks

open access: yesAin Shams Engineering Journal
Leader-follower cyber secure consensus problem in cybersecurity is crucial as it directly addresses the need for secure and stable communication in a networked system, which is paramount in safeguarding against cyber threats like denial-of-service ...
Asad Khan   +5 more
doaj   +1 more source

Business and social evaluation of denial of service attacks in view of scaling economic counter-measures [PDF]

open access: yes
This paper gives an analytical method to determine the economic and indirect implications of denial of service and distributed denial of service attacks.
Pau, Louis-François
core   +1 more source

TRAP: A Three-Way Handshake Server for TCP Connection Establishment

open access: yesApplied Sciences, 2016
Distributed denial of service attacks have become more and more frequent nowadays. In 2013, a massive distributed denial of service (DDoS) attack was launched against Spamhaus causing the service to shut down.
Fu-Hau Hsu   +5 more
doaj   +1 more source

Review of Recent Detection Methods for HTTP DDoS Attack

open access: yesJournal of Computer Networks and Communications, 2019
With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures.
Ghafar A. Jaafar   +2 more
doaj   +1 more source

Coding-based distributed filtering for cyber–physical systems under denial of service attacks

open access: yesJournal of Automation and Intelligence
This article investigates the distributed recursive filtering problem for discrete-time stochastic cyber–physical systems. A particular feature of our work is that we consider systems in which the state is constrained by saturation.
Shuang Feng   +4 more
doaj   +1 more source

A real-time machine-learning model for detecting and mitigating DDoS attacks

open access: yesCybersecurity
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are among the most lethal cyber threats in this world, which make an online service unavailable to its legitimate users by overwhelming the service provider’s resources.
Mohammad Fathian, Alireza Seifousadati
doaj   +1 more source

Intelligent Prevention of DDoS Attacks using Reinforcement Learning and Smart Contracts

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference
(Distributed) Denial-of-Service (DoS/DDoS) attacks are among the most dangerous cybersecurity threats to computer networks. Lately, blockchain and artificial intelligence (AI) cyberdefense applications have successfully been implemented to identify ...
Emily Struble   +2 more
doaj   +1 more source

Distributed Denial of Service Attack and its Countermeasures [PDF]

open access: yesInternational Journal of Web Applications, 2018
Akash Sharma   +4 more
openaire   +1 more source

Adaptive distributed honeypot detection network for enhanced cybersecurity against DoS and DDoS attacks

open access: yesResults in Engineering
The increasing prevalence and sophistication of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks present significant challenges in ensuring the security and stability of modern networked systems.
V. Selva Kumar   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy