Results 41 to 50 of about 117,160 (225)
Distributed Denial of Service Attacks: A Review [PDF]
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios.
Sonali Swetapadma Sahu, Manjusha Pandey
openaire +1 more source
The detection method of low-rate DoS attack based on multi-feature fusion
As a new type of Denial of Service (DoS) attacks, the Low-rate Denial of Service (LDoS) attacks make the traditional method of detecting Distributed Denial of Service Attack (DDoS) attacks useless due to the characteristics of a low average rate and ...
Liang Liu +3 more
doaj +1 more source
Distributed Denial of Service Attack Detection by Expert Systems [PDF]
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi +1 more
doaj +1 more source
This paper addresses the event-triggered distributed cooperative secure secondary control for islanded cyber-physical inverter-based ac microgrids (MGs) under the energy-limited denial of service (DoS) attacks.
Mahmood Jamali +4 more
semanticscholar +1 more source
Denial-of-service (DoS) attacks on website systems have become increasingly sophisticated. These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive measures.
Vu Thi Phuong*, Nguyen Van Vu, Dang Thi Hien
doaj +1 more source
Mitigation of Distributed Denial of Service Attacks in the Cloud
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups.
Alosaimi Wael +4 more
doaj +1 more source
Klasifikasi Paket Jaringan Berbasis Analisis Statistik dan Neural Network [PDF]
Distributed Denial-of-Service (DDoS) is one of network attack technique which increased every year, especially in both of intensity and volume. DDoS attacks are still one of the world's major Internet threats and become a major problem of cyber-world ...
Harsono, Harsono +2 more
core +4 more sources
A SYN fl ooding attack detection approach with hierarchical policies based on self-information
The SYN flooding attack is widely used in cyber attacks because it paralyzes the network by causing the system and bandwidth resources to be exhausted. This paper proposed a self-information approach for detecting the SYN flooding attack and provided a ...
Jia-Rong Sun +2 more
doaj +1 more source
DDosTC: A Transformer-Based Network Attack Detection Hybrid Mechanism in SDN
Software-defined networking (SDN) has emerged in recent years as a form of Internet architecture. Its scalability, dynamics, and programmability simplify the traditional Internet structure.
Haomin Wang, Wei Li
doaj +1 more source
Towards Stabilization of Distributed Systems under Denial-of-Service
In this paper, we consider networked distributed systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network.
De Persis, Claudio +2 more
core +2 more sources

