Results 51 to 60 of about 117,160 (225)

An autonomic approach to denial of service defence [PDF]

open access: yes, 2005
Denial of service attacks, viruses and worms are com- mon tools for malicious adversarial behaviour in networks. In this paper we propose the use of our autonomic routing protocol, the Cognitive Packet Network (CPN), as a means to defend nodes from ...
Gelenbe, E., Gellman, M., Loukas, G.
core   +1 more source

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS [PDF]

open access: yesICTACT Journal on Communication Technology, 2010
Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service) attacks stealthy and difficult to counter.
S.Seetha, P.Raviraj
doaj  

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

open access: yesSensors, 2016
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and ...
João José Costa Gondim   +4 more
doaj   +1 more source

Defending Against Denial of Service [PDF]

open access: yes, 2012
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...

core  

Distributed Denial of Service is a Scalability Problem

open access: yes, 2011
Distributed denial of service attacks are often considered a security problem. While this may be the way to view the problem with today's Internet, new network architectures attempting to address the issue should view it as a scalability problem.
Chung, Yoo
core   +1 more source

D-FAC: A novel ϕ-Divergence based distributed DDoS defense system

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
A Distributed Denial of Service (DDoS) attack is an austere menace to extensively used Internet-based services and applications. Despite the presence of enormous DDoS defense solutions, the in-time detection of DDoS attacks poses a stiff challenge to ...
Sunny Behal   +2 more
doaj   +1 more source

IoT Botnets Analysis [PDF]

open access: yes, 2017
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S.   +2 more
core  

Detecting and Reacting against Distributed Denial of Service Attacks [PDF]

open access: yes2006 IEEE International Conference on Communications, 2006
Distributed denial of service attacks (DDoS) are becoming a big threat to the Internet. Recently, some DDoS attacks have infected more than 100,000 vulnerable hosts over Internet within 10 minutes. Consequences of these attacks can be devastating toward many companies whose security policy against this kind of attacks relies only on reconfiguring ...
Bouzida, Yacine   +2 more
openaire   +2 more sources

Distributed denial of service attacks classification system using features selection and ensemble techniques

open access: yesIndonesian Journal of Electrical Engineering and Computer Science
Distributed denial-of-service (DDoS) attacks are expanding threat to online services and websites. These attacks overwhelm targets with traffic from multiple sources to exhaust resources and make services unavailable.
Leila Bagdadi, B. Messabih
semanticscholar   +1 more source

Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions

open access: yesInternational Journal on Semantic Web and Information Systems (IJSWIS), 2022
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities.
Anshuman Singh, Brij B. Gupta
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy