Results 171 to 180 of about 117,160 (225)
Some of the next articles are maybe not open access.
On the Move: Evading Distributed Denial-of-Service Attacks
Computer, 2016A proposed moving-target defense against DDoS attacks repeatedly shuffles client-to-server assignments to identify and eventually quarantine malicious clients.
Angelos Stavrou +2 more
openaire +1 more source
Honeypots for distributed denial-of-service attacks
Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003Distributed denial-of-service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made, but none are successful by themselves. In this paper, we present a system that helps to defend a network from DDoS attacks.
openaire +1 more source
IEEE Transactions on Automatic Control
This article provides a secure distributed output feedback model predictive control (DOFMPC) solution for the leader-following consensus problems of homogeneous linear disturbed multi-agent systems against multiple cyber attacks. The false data injection
Zhengcai Li +4 more
semanticscholar +1 more source
This article provides a secure distributed output feedback model predictive control (DOFMPC) solution for the leader-following consensus problems of homogeneous linear disturbed multi-agent systems against multiple cyber attacks. The false data injection
Zhengcai Li +4 more
semanticscholar +1 more source
Distributed Denial of Service (DDoS) Attacks
2021The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration.
Brij B. Gupta, Amrita Dahiya
openaire +1 more source
IEEE Transactions on Circuits and Systems - II - Express Briefs, 2023
This brief presents the design of a distributed estimator for joint state and unknown input estimation of nonlinear systems subject to denial-of-service (DoS) attacks and stochastic disturbances.
Abdul Basit +4 more
semanticscholar +1 more source
This brief presents the design of a distributed estimator for joint state and unknown input estimation of nonlinear systems subject to denial-of-service (DoS) attacks and stochastic disturbances.
Abdul Basit +4 more
semanticscholar +1 more source
European Journal of Criminology
Cybercrime as a service is lowering the barrier to entry for crime. Aspiring criminals can access cybercrime services through the clear web using search engines.
A. Moneva, E. R. Leukfeldt
semanticscholar +1 more source
Cybercrime as a service is lowering the barrier to entry for crime. Aspiring criminals can access cybercrime services through the clear web using search engines.
A. Moneva, E. R. Leukfeldt
semanticscholar +1 more source
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning
International Conference on Security of Information and Networks5G slices are susceptible to indirect Distributed Denial of Service (DDoS) attacks, where overwhelming traffic directed to one slice can also disrupt other slices sharing the same infrastructure Many current mitigation methods rely on a detection phase ...
A. Javadpour +3 more
semanticscholar +1 more source
Autonomic Response to Distributed Denial of Service Attacks
2001The Cooperative Intrusion Traceback and Response Architecture (CITRA) [1] and the Intruder Detection and Isolation Protocol (IDIP) [2] provide an infrastructure that enables intrusion detection systems, firewalls, routers, and other components to cooperatively trace and block network intrusions as close to their sources as possible.
Daniel F. Sterne +6 more
openaire +1 more source
Distributed Defense Against Distributed Denial-of-Service Attacks
2005Distributed defense is a promising way to neutralize the distributed Denial-of-Service attacks by detecting and responding the attacking sources widespread around the Internet. Components of the distributed defense system will cooperate with each other to combat the attacks. Compared with the centralized defense systems, distributed defense systems can
Wei Shi +2 more
openaire +1 more source
Protection Tool for Distributed Denial of Services Attack
2014This article presents a potential tool for solving one of the biggest problems of security of network resources in computer networks. This problem are the Distributed Denial of Service attacks, which are able to block the computer networks. The authors introduce the nature of the problem and subsequently present a tool which provides a possible ...
Lukasz Apiecionek +2 more
openaire +1 more source

