Results 31 to 40 of about 117,160 (225)
Distributed Denial of Service Attack Detection
Distributed Denial of Service (DDoS) attacks has been a persistent threat for network and applications. Successful attacks can lead to inaccessible service to legitimate users in time and loss of business reputation. In this paper, we explore DDoS attack detection using Term Frequency (TF)-Inverse Document Frequency (IDF) and Latent Semantic Indexing ...
Travis Blue, Hossain Shahriar
openaire +2 more sources
Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat
The application layer in the Internet protocol suite offers a significant degree of freedom regarding the orchestration of distributed denial-of-service attacks due to many different and unstandardized protocols.
Nikola Gavrić, Živko Bojović
doaj +1 more source
Protecting web services with service oriented traceback architecture [PDF]
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley +2 more
core +2 more sources
Today, the creation of more effective intrusion detection system (IDS) has become crucial due to the rise in computer malware. Ensuring the availability of the system is an important component of information security and the most important requirement of
Sabreen A. Zahra Mghames +1 more
semanticscholar +1 more source
Integrated Distributed Authentication Protocol for Smart Grid Communications [PDF]
In the smart grid, an integrated distributed authen- tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications.
Choi, B.J., Saxena, N.
core +3 more sources
Cyberattacks can trigger power outages, military equipment problems, and breaches of confidential information, i.e., medical records could be stolen if they get into the wrong hands.
Umar Islam +8 more
semanticscholar +1 more source
Detection of DDoS Attacks in Software Defined Networking Using Entropy
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent years. With the substantial increase in the number of Internet users, network security threats appear more frequently, which brings more concerns to SDN ...
Cong Fan +5 more
doaj +1 more source
DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation [PDF]
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable ...
De Donno, Michele +3 more
core +4 more sources
A Review on Distributed Denial of Service Attack
Today’s world, technology has become an inevitable part of human life. In fact, during the Covid-19 pandemic, everything from the corporate world to educational institutions has shifted from offline to online. It leads to exponential increase in intrusions and attacks over the internet-based technologies.
R. Karthikeyani, E. Karthikeyan
openaire +1 more source
Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds
Distributed computing technology is widely used by Internet-based business applications. Supply chain management (SCM), customer relationship management (CRM), e-Commerce, and banking are some of the applications employing distributed computing.
Jaideep Gera, Bhanu Prakash Battula
doaj +1 more source

