Results 21 to 30 of about 117,160 (225)

Detection of Distributed Denial of Service Attacks for IoT-Based Healthcare Systems

open access: yesComputer Assisted Methods in Engineering and Science, 2022
One of the major common assaults in the current Internet of things (IoT) network-based healthcare infrastructures is distributed denial of service (DDoS).
Gaganjot Kaur, Prinima Gupta
doaj   +1 more source

AntibIoTic: Protecting IoT Devices Against DDoS Attacks [PDF]

open access: yes, 2017
The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack.
De Donno, Michele   +3 more
core   +2 more sources

Intelligent Detection of Distributed Denial of Service Attacks: A Supervised Machine Learning and Ensemble Approach

open access: yesIraqi Journal for Computer Science and Mathematics, 2023
The rapid growth of IoT, smart devices, and 5G networks has increased the prevalence and complexity of Distributed Denial of Service (DDoS) attacks, posing significant challenges to cybersecurity.
Mustafa S. Ibrahim Alsumaidaie   +2 more
doaj   +1 more source

Evaluation of Bernoulli Naive Bayes model for detection of distributed denial of service attacks

open access: yesBulletin of Electrical Engineering and Informatics, 2023
Distributed denial of service is a form of cyber-attack that involves sending several network traffic to a target system such as DHCP, domain name server (DNS), and HTTP server.
A. Salau   +3 more
semanticscholar   +1 more source

Distributed denial-of-service (DDOS) attack detection using supervised machine learning algorithms. [PDF]

open access: yesSci Rep
Distributed Denial-of-Service (DDoS) attacks have become a critical issue in cyber security. This can lead to a temporary or even prolonged loss of service for users.
Abiramasundari S, Ramaswamy V.
europepmc   +2 more sources

Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy

open access: yesApplied Sciences, 2022
Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new services and computing resources at a fraction of the costs for end-users than traditional ...
Ziyad R. Alashhab   +5 more
semanticscholar   +1 more source

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community.
Tasnuva Mahjabin   +3 more
doaj   +1 more source

Hybrid of Supervised Learning and Optimization Algorithm for Optimal Detection of IoT Distributed Denial of Service Attacks

open access: yesInternational Journal of Innovative Computing, 2023
The high-speed internet has led to the development of Internet of Things (IoT) with a fundamental Three-Layer IoT architecture. However, small amount of un-indicative data captured at the end level of IoT network makes the edge IoT devices susceptible to
T. Farid, M. Sirat
semanticscholar   +1 more source

Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm

open access: yesSensors, 2023
Internet security is a major concern these days due to the increasing demand for information technology (IT)-based platforms and cloud computing. With its expansion, the Internet has been facing various types of attacks.
Mahrukh Ramzan   +6 more
doaj   +1 more source

Efficient model for detecting application layer distributed denial of service attacks

open access: yesBulletin of Electrical Engineering and Informatics, 2023
The increasing advancement of technologies and communication infrastructures has been posing threats to the internet services. One of the most powerful attack weapons for disrupting web-based services is the distributed denial of service (DDoS) attack ...
M. Kareem   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy