Results 101 to 110 of about 20,777 (211)
Fingerprinting Internet DNS Amplification DDoS Activities
This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) activities using darknet ...
Bou-Harb, Elias +2 more
core +1 more source
Model for Detection and Classification of DDoS Traffic Based on Artificial Neural Network
Detection of DDoS (Distributed Denial of Service) traffic is of great importance for the availability protection of services and other information and communication resources.
D. Peraković +3 more
doaj +1 more source
An SDNFV-Based DDoS Defense Technology for Smart Cities
A software defined networking (SDN)-enabled smart city is a new paradigm that can effectively improve the cost efficiency and flexibility of data management through data-control separation.
Chuanfeng Xu +4 more
doaj +1 more source
An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks.
Gupta, B. B., Joshi, R. C., Misra, Manoj
core +1 more source
Defending Distributed Denial Of Service (Ddos) Attacks: Classification And Art
There are a lot of companies operating its online businesses including ecommerce, e-banking, financial services, and other web-based services using the Internet. With the enormous increase in the number of hosts, it becomes challenging to provide the resources to legitimate users and to protect the resources from attackers.
Abhishek Jain +5 more
openaire +1 more source
Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services).
Adrien Bonguet, Martine Bellaiche
doaj +1 more source
The popularity of cloud computing, with its incredible scalability and accessibility, has already welcomed a new era of innovation. Consumers who subscribe to a cloud-based service and use the associated pay-as-you-go features have unlimited access to ...
Yongqiang Shang
doaj +1 more source
Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures [PDF]
Over the last decade, the level of critical infrastructure technology has been steadily transforming in order to keep pace with the growing demand for the services offered.
Hurst, W, Monnet, Q, Shone, N
core
This comprehensive study examines cutting-edge strategies for combating Distributed Denial of Service (DDoS) attacks in cloud environments, addressing a critical gap in recent literature. Through a systematic review of the latest advancements, we propose
Mohamed Ouhssini +4 more
doaj +1 more source

