Results 41 to 50 of about 117,160 (225)

Distributed Denial of Service Attacks: A Review [PDF]

open access: yesInternational Journal of Modern Education and Computer Science, 2014
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios.
Sonali Swetapadma Sahu, Manjusha Pandey
openaire   +1 more source

The detection method of low-rate DoS attack based on multi-feature fusion

open access: yesDigital Communications and Networks, 2020
As a new type of Denial of Service (DoS) attacks, the Low-rate Denial of Service (LDoS) attacks make the traditional method of detecting Distributed Denial of Service Attack (DDoS) attacks useless due to the characteristics of a low average rate and ...
Liang Liu   +3 more
doaj   +1 more source

Distributed Denial of Service Attack Detection by Expert Systems [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2016
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi   +1 more
doaj   +1 more source

Distributed Cooperative Event-Triggered Control of Cyber-Physical AC Microgrids Subject to Denial-of-Service Attacks

open access: yesIEEE Transactions on Smart Grid, 2023
This paper addresses the event-triggered distributed cooperative secure secondary control for islanded cyber-physical inverter-based ac microgrids (MGs) under the energy-limited denial of service (DoS) attacks.
Mahmood Jamali   +4 more
semanticscholar   +1 more source

A STUDY PROPOSING IMPROVEMENTS TO OVERLAY NETWORK ARCHITECTURE TO MITIGATE THE IMPACT OF DISTRIBUTED DENIAL-OF-SERVICE ATTACKS ON WEBSITE SYSTEMS

open access: yesTạp chí Khoa học
Denial-of-service (DoS) attacks on website systems have become increasingly sophisticated. These attacks are evolving at a pace and complexity that outstrips the capabilities of current defensive measures.
Vu Thi Phuong*, Nguyen Van Vu, Dang Thi Hien
doaj   +1 more source

Mitigation of Distributed Denial of Service Attacks in the Cloud

open access: yesCybernetics and Information Technologies, 2017
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups.
Alosaimi Wael   +4 more
doaj   +1 more source

Klasifikasi Paket Jaringan Berbasis Analisis Statistik dan Neural Network [PDF]

open access: yes, 2018
Distributed Denial-of-Service (DDoS) is one of network attack technique which increased every year, especially in both of intensity and volume. DDoS attacks are still one of the world's major Internet threats and become a major problem of cyber-world ...
Harsono, Harsono   +2 more
core   +4 more sources

A SYN fl ooding attack detection approach with hierarchical policies based on self-information

open access: yesETRI Journal, 2022
The SYN flooding attack is widely used in cyber attacks because it paralyzes the network by causing the system and bandwidth resources to be exhausted. This paper proposed a self-information approach for detecting the SYN flooding attack and provided a ...
Jia-Rong Sun   +2 more
doaj   +1 more source

DDosTC: A Transformer-Based Network Attack Detection Hybrid Mechanism in SDN

open access: yesSensors, 2021
Software-defined networking (SDN) has emerged in recent years as a form of Internet architecture. Its scalability, dynamics, and programmability simplify the traditional Internet structure.
Haomin Wang, Wei Li
doaj   +1 more source

Towards Stabilization of Distributed Systems under Denial-of-Service

open access: yes, 2017
In this paper, we consider networked distributed systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network.
De Persis, Claudio   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy