Results 31 to 40 of about 20,777 (211)

A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors

open access: yesApplied Sciences, 2019
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks.
Jian Zhang, Qidi Liang, Rui Jiang, Xi Li
doaj   +1 more source

Detecting Distributed Denial-of-Service DDoS Attacks [PDF]

open access: yesCurrent Trends in Computer Sciences & Applications, 2019
Security of information is of utmost importance to organization striving to survive in a competitive marketplace. Network security has been an issue since computer networks became prevalent, most especially now that internet is changing the face of computing.
openaire   +1 more source

An autonomic approach to denial of service defence [PDF]

open access: yes, 2005
Denial of service attacks, viruses and worms are com- mon tools for malicious adversarial behaviour in networks. In this paper we propose the use of our autonomic routing protocol, the Cognitive Packet Network (CPN), as a means to defend nodes from ...
Gelenbe, E., Gellman, M., Loukas, G.
core   +1 more source

TRAP: A Three-Way Handshake Server for TCP Connection Establishment

open access: yesApplied Sciences, 2016
Distributed denial of service attacks have become more and more frequent nowadays. In 2013, a massive distributed denial of service (DDoS) attack was launched against Spamhaus causing the service to shut down.
Fu-Hau Hsu   +5 more
doaj   +1 more source

Real-time DDoS attack detection based on deep learning

open access: yesDianxin kexue, 2017
Distributed denial of service (DDoS) is a special form of denial of service (DoS) attack based on denial of service(DoS).It is a distributed,collaborative large-scale network attack.A DDoS detection method based on deep learning was presented.The method ...
Chuanhuang LI   +5 more
doaj   +2 more sources

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS [PDF]

open access: yesICTACT Journal on Communication Technology, 2010
Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service) attacks stealthy and difficult to counter.
S.Seetha, P.Raviraj
doaj  

A deep learning based intelligent framework to mitigate DDoS attack in fog environment

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Fog computing (FC) is a contemporary computing paradigm that gives additional support to cloud environment by carrying out some local data analysis in edge of the devices, facilitating networking, computing, infrastructure and storage support as backbone
Rojalina Priyadarshini   +1 more
doaj   +1 more source

Scalable DDoS mitigation system for data centers [PDF]

open access: yes, 2015
Distributed Denial of Service attacks (DDoS) have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet.
Martinásek, Zdeněk
core   +2 more sources

Detecting High and Low Intensity Distributed Denial of Service (DDoS) Attacks [PDF]

open access: yes, 2021
<p>High and low-intensity attacks are two common Distributed Denial of Service (DDoS) attacks that disrupt Internet users and their daily operations. Detecting these attacks is important to ensure that communication, business operations, and education facilities can run smoothly.
openaire   +2 more sources

Principal Component Analysis-Multilinear Perceptron-based model for Distributed Denial of Service Attack Mitigation

open access: yesABUAD Journal of Engineering Research and Development
The increasing occurrence of Distributed Denial of Service (DDoS) attacks has caused significant disruptions in global network services, overwhelming targets by flooding them with requests from various sources.
Opeyemi Oreoluwa Asaolu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy