Results 71 to 80 of about 117,160 (225)

Performance and security testing of network applications [PDF]

open access: yes, 2013
Cieľom tejto diplomovej práce je navrhnúť a realizovať bezpečnostný test na základe skúmania odolnosti testovaného zariadenia voči pôsobeniu distribuovaného útoku odoprenia služby DDoS SYN Flood.
Matej, Michal
core  

Distributed Denial of Service (DDOS) Attacks Detection Mechanism

open access: yesInternational Journal of Computer Science, Engineering and Information Technology, 2011
Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers.
Saravanan Kumarasamy, R. Asokan
openaire   +3 more sources

A Distributed Network Intrusion Detection System for Distributed Denial of Service Attacks in Vehicular Ad Hoc Network

open access: yesIEEE Access, 2019
Security assurance in Vehicular Ad hoc Network (VANET) is a crucial and challenging task due to the open-access medium. One great threat to VANETs is Distributed Denial-of-Service (DDoS) attack because the target of this attack is to prevent authorized ...
Ying Gao   +5 more
semanticscholar   +1 more source

Distributed Denial of Service Detection with IPFIX Protocol

open access: yesБезопасность информационных технологий, 2011
In this article the existing methods of detecting Distributed Denial of Service attacks based on the analysis of network traffic or Netflow data is examined. Advantages and disadvantages of anomaly detection methods are listed.
M. R. Mukhtarov
doaj  

Principal Component Analysis-Multilinear Perceptron-based model for Distributed Denial of Service Attack Mitigation

open access: yesABUAD Journal of Engineering Research and Development
The increasing occurrence of Distributed Denial of Service (DDoS) attacks has caused significant disruptions in global network services, overwhelming targets by flooding them with requests from various sources.
Opeyemi Oreoluwa Asaolu   +3 more
doaj   +1 more source

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Adaptive Response System for Distributed Denial-of-Service Attacks

open access: yes, 2008
The continued prevalence and severe damaging effects of the Distributed Denial of Service (DDoS) attacks in today’s Internet raise growing security concerns and call for an immediate response to come up with better solutions to tackle DDoS attacks. The
Thing, Vrizlynn Ling Ling   +1 more
core   +1 more source

An Approach for Mitigating Denial of Service Attack [PDF]

open access: yes, 2013
Distributed Denial of Service (DDoS) attacks are the most common types of cyber-attack on the internet and are rapidly increasing. Denial of service/distributed denial of service attack is an explicit attempt to make a machine or a network resource ...
Chauhan, Chetan
core  

On the Efficacy of Live DDoS Detection with Hadoop

open access: yes, 2015
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core   +1 more source

Prevention and detection of DDOS attack in virtual cloud computing environment using Naive Bayes algorithm of machine learning

open access: yesMeasurement: Sensors
The popularity of cloud computing, with its incredible scalability and accessibility, has already welcomed a new era of innovation. Consumers who subscribe to a cloud-based service and use the associated pay-as-you-go features have unlimited access to ...
Yongqiang Shang
doaj   +1 more source

Home - About - Disclaimer - Privacy