Results 161 to 170 of about 117,160 (225)
Some of the next articles are maybe not open access.

An examination of distributed denial of service attacks

2015 IEEE International Conference on Electro/Information Technology (EIT), 2015
Denial of service (DoS) attacks have been around for a significant period of time and is exponentially growing in popularity. This paper discusses various DoS attacks and the evolution towards distributed denial of service (DDoS) attacks. An analysis of high profile attacks will be conducted to evaluate the methods used by the attackers.
Alex Bartholemy, Weifeng Chen
openaire   +1 more source

DDoSLSTM: Detection of Distributed Denial of Service Attacks on IoT Devices using LSTM Model

2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), 2022
Distributed Denial of Service (DDoS) attack is a persistent complication in the network's security. These attacks have been detected by many machine learning algorithms and feature selection methods.
V. Gaur, Rajneesh Kumar
semanticscholar   +1 more source

A Service Architecture for Countering Distributed Denial of Service Attacks

21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
We present AMP, a novel service architecture for countering distributed denial of service (dDos) attacks. AMP uses dynamically configured network components to perform traffic monitoring, filtering and detection of commonly known attacks. It does not require universal deployment and is complementary to other schemes for countering dDoS attacks, however
Fareed Zaffar, Gershon Kedem
openaire   +1 more source

Denial of service and distributed denial of service attacks

Modern Problems of Radio Engineering, Telecommunications and Computer Science (IEEE Cat. No.02EX542), 2003
The main types of denial of service (DoS) attacks which flood a victim's communication channel bandwidth are considered, their analysis is carried out and methods of protection from these attacks are offered.
openaire   +1 more source

Detection of Distributed Denial of Service Attacks in SDN using Machine learning techniques

International Conference on Computational Collective Intelligence, 2021
Software-defined network (SDN) is a network architecture that used to build, design the hardware components virtually. We can dynamically change the settings of network connections.
K. Sudar   +4 more
semanticscholar   +1 more source

Surviving Distributed Denial-of-Service Attacks

IT Professional, 2009
Business organizations and government agencies that depend on an Internet presence but operate without effective DDoS protection mechanisms put their operations at unacceptable risk. Unfortunately, the varieties of DDoS attacks, the incomplete information we have about them, the difficulty of large-scale testing, and the need for a distributed response
openaire   +1 more source

Artificial intelligence-driven method for the discovery and prevention of distributed denial of service attacks

IAES International Journal of Artificial Intelligence (IJ-AI)
Distributed denial of service (DDoS) attacks has emerged as a prominent cyber threat in contemporary times. By impeding the machine's capacity to give services to legitimate clients, the impacted system performance and buffer size are reduced ...
Ashraf Aldabbas   +5 more
semanticscholar   +1 more source

Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions

Concurrency Computation Practice and Experience, 2021
A distributed denial of service (DDoS) attack is a significant threat to web‐based applications and hindering legitimate traffic (denies access to benign users) by overwhelming the victim system or its infrastructure (service, bandwidth, networking ...
Nilesh Vishwasrao Patil   +2 more
exaly   +2 more sources

Distributed denial of service attacks and detection mechanisms

Journal of Computational Methods in Sciences and Engineering, 2015
Distributed Denial of Service (DDoS) attack is a coordinated effort between several machines to attack one or multiple target systems. Indeed, the attack is through imposing additional burden on system resources or flood computation and communication resources, the server services for legitimate users, are unavailable.
Marjan Kuchaki Rafsanjani   +1 more
openaire   +1 more source

An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things

IEEE Transactions on Industrial Informatics, 2020
Leveraging high-performance software-defined networks (SDNs) to manage industrial Internet of Things (IIoT) devices has become a promising trend; the SDN is expected to be the next generation as a unified and virtualized network platform that provides ...
Miao Du, Kun Wang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy