Results 181 to 190 of about 117,160 (225)
Some of the next articles are maybe not open access.

A survey of distributed denial of service attack

2016 10th International Conference on Intelligent Systems and Control (ISCO), 2016
Information security deals with a large number of subjects like spoofed message detection, audio processing, video surveillance and cyber-attack detections. However the biggest threat for the homeland security is cyber-attacks. Distributed Denial of Service attack is one among them.
K. Narasimha Mallikarjunan   +2 more
openaire   +1 more source

DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning

Computer/law journal, 2019
At the advent of advanced wireless technology and contemporary computing paradigms, Distributed Denial of Service (DDoS) attacks on Web-based services have not only increased exponentially in number, but also in the degree of sophistication; hence the ...
Muhammad Asad   +5 more
semanticscholar   +1 more source

A taxonomy of distributed denial of service attacks

2017 International Conference on Information Society (i-Society), 2017
The Internet of Things revolution promises to make our lives much easier by providing us cheap and convenient smart devices, but all that glitters is not gold. This plethora of devices that flooded the market, generally poorly designed with respect to security aspects, brought back to the top Distributed Denial of Service (DDoS) attacks which are now ...
De Donno M.   +3 more
openaire   +2 more sources

Defeating distributed denial of service attacks

IT Professional, 2000
Security experts generally acknowledge that the long-term solution to distributed denial of service attacks is to increase the security level of Internet computers. Attackers would then be unable to find zombie computers to control. Internet users would also have to set up globally coordinated filters to stop attacks early.
null Xianjun Geng, A.B. Whinston
openaire   +1 more source

Distributed denial-of-service attacks against HTTP/2 services

Cluster Computing, 2016
HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor.
Erwin Adi   +3 more
openaire   +1 more source

Distributed Denial of Service Attack Prevention at Source Machines

2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2018
Distributed denial of service (DDoS) attacks is a serious cyberattack that exhausts target machine's processing capacity by sending a huge number of packets from hijacked machines. To minimize resource consumption caused by DDoS attacks, filtering attack packets at source machines is the best approach.
Masanori Misono   +3 more
openaire   +1 more source

A Novel Method of Using Machine Learning Techniques to Protect Clouds Against Distributed Denial of Service (DDoS) Attacks.

Babylonian Journal of Machine Learning
The term "cloud computing" describes a method of providing hardware- and software-based services over the internet. This allows users to access their data and apps from any device.
Sangeeta Devi   +2 more
semanticscholar   +1 more source

Managing Distributed Denial-Of-Service Attacks

EDPACS, 2002
Abstract For electronic commerce (E-commerce) entities, security incidents continue to be the most significant risk (in terms of costs) associated with their businesses. Distributed denial-of-service (DDoS) attacks have a debilitating effect on commercial transactions because commerce entities cannot do any legitimate business.
openaire   +1 more source

Mitigating distributed denial of service attacks at the application layer

Proceedings of the Symposium on Applied Computing, 2017
Distributed Denial of Service (DDoS) attacks on web applications have been a persistent threat. Existing approaches for mitigating application layer DDoS attacks have limitations such low detection rate and inability to detect attacks targeting resource files.
Robert Bronte   +2 more
openaire   +1 more source

Distributed denial of service attack and defense

2010 International Conference on Educational and Information Technology, 2010
A distributed denial of service attack (DDoS) is adopted to hackers often attack means. The paper introduces the denial of service attack types, introduces DDoS attack the principle and the steps, Combined with the more common Syn Flood Attack principle, The actual defenses and DDoS.
openaire   +1 more source

Home - About - Disclaimer - Privacy