Results 61 to 70 of about 117,160 (225)
An SDN-based Approach For Defending Against Reflective DDoS Attacks
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet services. The potential scale of such attacks became apparent in March 2018 when a memcached-based attack peaked at 1.7 Tbps.
Erb, Benjamin +4 more
core +1 more source
Proactive detection of DDOS attacks in Publish-Subscribe networks [PDF]
Information centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) or Publish-Subscribe Internet Technology (PURSUIT) has been proposed as an important candidate for the Internet of the future.
Alarfaj, Fawaz +4 more
core +2 more sources
A Survey of Distributed Denial of Service Attacks and Defenses
A distributed denial-of-service (DDoS) attack is an attack wherein multiple compromised computer systems flood the bandwidth and/or resources of a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.
openaire +2 more sources
Active router approach to defeating denial-of-service attacks in networks [PDF]
Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. These
El-Moussa, FA, Hope, MD, Linge, N
core +1 more source
Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF
Kubernetes is an orchestration tool that runs and manages container-based workloads. It works as a collection of different virtual or physical servers that support multiple storage capacities, provide network functionalities, and keep all containerized ...
Amin Sadiq +5 more
doaj +1 more source
In recent years, we have seen an increase in computer attacks through our communication networks worldwide, whether due to cybersecurity systems’ vulnerability or their absence.
Esteban Payares +1 more
semanticscholar +1 more source
Considered distributed delay control strategy for Leader-Following cyber secure consensus in Riemann–Liouville fractional-order delayed Multi-Agent system under Denial-of-Service Attacks, where the associated topology is a switching weighted digraph.
José Roberto Castilho Piqueira +3 more
doaj +1 more source
A review of detection approaches for distributed denial of service attacks
Distributed Denial of Service (DDoS) attacks are the intimidation trials on the Internet that depletes the network bandwidth or exhausts the victim’s resources. Researchers have introduced various defense mechanisms (such as attack prevention, traceback,
Parneet Kaur +2 more
doaj +1 more source
Detection of TCP targeted high bandwidth attacks using self-similarity
In this paper the authors have tried to measure the impact of different variants of pulsating distributed denial of service attacks on the self-similar nature of the network traffic and to see if the variation in the H index could be used for ...
Gagandeep Kaur, Vikas Saxena, J.P. Gupta
doaj +1 more source
AccFlow: Defending against the Low-Rate TCP DoS Attack in Drones
As drones are widely employed in various industries and daily life, concerns regarding their safety have been gradually emerging. Denial of service (DoS) attacks have become one of the most significant threats to the stability of resource-constrained ...
Yuan Cao +5 more
doaj +1 more source

