Results 21 to 30 of about 20,777 (211)

Distributed Denial of Service Attack Detection by Expert Systems [PDF]

open access: yesمطالعات مدیریت کسب و کار هوشمند, 2016
The Denial of Service (DoS) attacks are the attacks that overload the system resources such as CPU, network bandwidth, memory and so on to prevent system to provide services any legitimate users.
Alireza Sadabadi   +1 more
doaj   +1 more source

A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks

open access: yesEngineering Science and Technology, an International Journal, 2022
Denial of Service and Distributed Denial of Service (DoS/DDoS) attacks have been one of the biggest threats against communication networks and applications throughout the years.
Juan Fernando Balarezo   +4 more
doaj   +1 more source

Distributed Denial of Service (DDOS) Attacks Detection Mechanism

open access: yesInternational Journal of Computer Science, Engineering and Information Technology, 2011
Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers.
Saravanan Kumarasamy, R. Asokan
openaire   +3 more sources

Detection of spoofed and non-spoofed DDoS attacks and discriminating them from flash crowds

open access: yesEURASIP Journal on Information Security, 2018
Distributed computing technology is widely used by Internet-based business applications. Supply chain management (SCM), customer relationship management (CRM), e-Commerce, and banking are some of the applications employing distributed computing.
Jaideep Gera, Bhanu Prakash Battula
doaj   +1 more source

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

open access: yesSensors, 2016
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and ...
João José Costa Gondim   +4 more
doaj   +1 more source

DDOS ATTACK DETECTION AND MITIGATION AT SDN ENVIROMENT

open access: yesIraqi Journal of Information & Communication Technology, 2021
- Software-Defined Networking (SDN) is a promising sample that allows the programming behind the network’s operation with some abstraction level from the underlying networking devices .the insistence to detect and mitigate Distributed Denial of Service ...
Huda S. Abdulkarem, Ammar D. Alethawy
doaj   +1 more source

Detection of DDoS Attacks in OpenStack-based Private Cloud Using Apache Spark

open access: yesJournal of Telecommunications and Information Technology, 2020
Security is a critical concern for cloud service providers. Distributed denial of service (DDoS) attacks are the most frequent of all cloud security threats, and the consequences of damage caused by DDoS are very serious.
Shweta Gumaste   +3 more
doaj   +1 more source

Impact of Defending Strategy Decision on DDoS Attack

open access: yesComplexity, 2021
Distributed denial-of-service (DDoS) attack is a serious threat to cybersecurity. Many strategies used to defend against DDoS attacks have been proposed recently.
Chunming Zhang
doaj   +1 more source

Security Attacks on E-Voting System Using Blockchain

open access: yesIraqi Journal for Computer Science and Mathematics, 2023
Electronic voting has become popular in democratic countries, and thus the cyber security of this system is demanded. In this paper, some attacks were made on a proposed electronic election model based on blockchain technology, where the impact of each ...
Saba Abdulbaqi Salman   +2 more
doaj   +1 more source

Protecting web services with service oriented traceback architecture [PDF]

open access: yes, 2008
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy