Results 61 to 70 of about 117,160 (225)

An SDN-based Approach For Defending Against Reflective DDoS Attacks

open access: yes, 2018
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps.
Erb, Benjamin   +4 more
core   +1 more source

Proactive detection of DDOS attacks in Publish-Subscribe networks [PDF]

open access: yes, 2016
Information centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) or Publish-Subscribe Internet Technology (PURSUIT) has been proposed as an important candidate for the Internet of the future.
Alarfaj, Fawaz   +4 more
core   +2 more sources

A Survey of Distributed Denial of Service Attacks and Defenses

open access: yesCoRR, 2020
A distributed denial-of-service (DDoS) attack is an attack wherein multiple compromised computer systems flood the bandwidth and/or resources of a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
openaire   +2 more sources

Active router approach to defeating denial-of-service attacks in networks [PDF]

open access: yes, 2007
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core   +1 more source

Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF

open access: yesApplied Sciences, 2023
Kubernetes is an orchestration tool that runs and manages container-based workloads. It works as a collection of different virtual or physical servers that support multiple storage capacities, provide network functionalities, and keep all containerized ...
Amin Sadiq   +5 more
doaj   +1 more source

Quantum machine learning for intrusion detection of distributed denial of service attacks: a comparative overview

open access: yesOPTO, 2021
In recent years, we have seen an increase in computer attacks through our communication networks worldwide, whether due to cybersecurity systems’ vulnerability or their absence.
Esteban Payares   +1 more
semanticscholar   +1 more source

Distributed delay control strategy for leader-following cyber secure consensus in Riemann–Liouville fractional-order delayed multi-agent systems under denial-of-service attacks

open access: yesPartial Differential Equations in Applied Mathematics
Considered distributed delay control strategy for Leader-Following cyber secure consensus in Riemann–Liouville fractional-order delayed Multi-Agent system under Denial-of-Service Attacks, where the associated topology is a switching weighted digraph.
José Roberto Castilho Piqueira   +3 more
doaj   +1 more source

A review of detection approaches for distributed denial of service attacks

open access: yesSystems Science & Control Engineering, 2017
Distributed Denial of Service (DDoS) attacks are the intimidation trials on the Internet that depletes the network bandwidth or exhausts the victim’s resources. Researchers have introduced various defense mechanisms (such as attack prevention, traceback,
Parneet Kaur   +2 more
doaj   +1 more source

Detection of TCP targeted high bandwidth attacks using self-similarity

open access: yesJournal of King Saud University: Computer and Information Sciences, 2020
In this paper the authors have tried to measure the impact of different variants of pulsating distributed denial of service attacks on the self-similar nature of the network traffic and to see if the variation in the H index could be used for ...
Gagandeep Kaur, Vikas Saxena, J.P. Gupta
doaj   +1 more source

AccFlow: Defending against the Low-Rate TCP DoS Attack in Drones

open access: yesApplied Sciences, 2023
As drones are widely employed in various industries and daily life, concerns regarding their safety have been gradually emerging. Denial of service (DoS) attacks have become one of the most significant threats to the stability of resource-constrained ...
Yuan Cao   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy