Results 21 to 30 of about 20,777 (211)
Distributed Denial of Service Attack Detection by Expert Systems [PDF]
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi +1 more
doaj +1 more source
A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks
Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks have been one of the biggest threats against communication networks and applications throughout the years.
Juan Fernando Balarezo +4 more
doaj +1 more source
Distributed Denial of Service (DDOS) Attacks Detection Mechanism
Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers.
Saravanan Kumarasamy, R. Asokan
openaire +3 more sources
Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds
Distributed computing technology is widely used by Internet-based business applications. Supply chain management (SCM), customer relationship management (CRM), e-Commerce, and banking are some of the applications employing distributed computing.
Jaideep Gera, Bhanu Prakash Battula
doaj +1 more source
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and ...
João José Costa Gondim +4 more
doaj +1 more source
DDOS ATTACK DETECTION AND MITIGATION AT SDN ENVIROMENT
- Software-Defined Networking (SDN) is a promising sample that allows the programming behind the network’s operation with some abstraction level from the underlying networking devices .the insistence to detect and mitigate Distributed Denial of Service ...
Huda S. Abdulkarem, Ammar D. Alethawy
doaj +1 more source
Detection of DDoS Attacks in OpenStack-based Private Cloud Using Apache Spark
Security is a critical concern for cloud service providers. Distributed denial of service (DDoS) attacks are the most frequent of all cloud security threats, and the consequences of damage caused by DDoS are very serious.
Shweta Gumaste +3 more
doaj +1 more source
Impact of Defending Strategy Decision on DDoS Attack
Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently.
Chunming Zhang
doaj +1 more source
Security Attacks on E-Voting System Using Blockchain
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each ...
Saba Abdulbaqi Salman +2 more
doaj +1 more source
Protecting web services with service oriented traceback architecture [PDF]
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley +2 more
core +2 more sources

