Results 161 to 170 of about 20,777 (211)

A Survey of Distributed Denial of Service (DDoS) Attack Mitigation Techniques

open access: yesInternational Journal of Computer Trends and Technology
openaire   +1 more source

Deployable Mechanisms for Distributed Denial-of-Service (DDoS) Attack Mitigation

open access: yesDeployable Mechanisms for Distributed Denial-of-Service (DDoS) Attack Mitigation
openaire  

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework

Journal of Network and Computer Applications, 2016
Despite the increasing popularity of cloud services, ensuring the security and availability of data, resources and services remains an ongoing research challenge. Distributed denial of service (DDoS) attacks are not a new threat, but remain a major security challenge and are a topic of ongoing research interest. Mitigating DDoS attack in cloud presents
Opeyemi Osanaiye   +2 more
exaly   +3 more sources

Distributed Denial of Service (DDoS) Attacks

2021
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration.
Brij B. Gupta, Amrita Dahiya
openaire   +1 more source

Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment

2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021
Cloud computing is the utility sharing platform through which users can rent the services as per their requirements. Users which have low computation resources rent the services from the cloud platform and increase their performances. Anyone can join the cloud computing platforms, this makes it the target of different types of cyberattacks.
Akshat Gaurav   +4 more
openaire   +3 more sources

The compliance implications of a cyberattack: a distributed denial of service (DDoS) attack explored

International Cybersecurity Law Review, 2023
Abstract The nuisance of cumbersome technological issues is a universal grievance of technology users. Beyond the immediate frustrations of the operational failure, rarely are the compliance implications of technological failures considered by users. Amongst these potential failures is the illegal acquisition of data, inadequate protection of personal ...
Fabian Maximilian Johannes Teichmann   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy