Results 31 to 40 of about 20,777 (211)
A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks.
Jian Zhang, Qidi Liang, Rui Jiang, Xi Li
doaj +1 more source
Detecting Distributed Denial-of-Service DDoS Attacks [PDF]
Security of information is of utmost importance to organization striving to survive in a competitive marketplace. Network security has been an issue since computer networks became prevalent, most especially now that internet is changing the face of computing.
openaire +1 more source
An autonomic approach to denial of service defence [PDF]
Denial of service attacks, viruses and worms are com- mon tools for malicious adversarial behaviour in networks. In this paper we propose the use of our autonomic routing protocol, the Cognitive Packet Network (CPN), as a means to defend nodes from ...
Gelenbe, E., Gellman, M., Loukas, G.
core +1 more source
TRAP: A Three-Way Handshake Server for TCP Connection Establishment
Distributed denial of service attacks have become more and more frequent nowadays. In 2013, a massive distributed denial of service (DDoS) attack was launched against Spamhaus causing the service to shut down.
Fu-Hau Hsu +5 more
doaj +1 more source
Real-time DDoS attack detection based on deep learning
Distributed denial of service (DDoS) is a special form of denial of service (DoS) attack based on denial of service(DoS).It is a distributed,collaborative large-scale network attack.A DDoS detection method based on deep learning was presented.The method ...
Chuanhuang LI +5 more
doaj +2 more sources
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS [PDF]
Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service) attacks stealthy and difficult to counter.
S.Seetha, P.Raviraj
doaj
A deep learning based intelligent framework to mitigate DDoS attack in fog environment
Fog computing (FC) is a contemporary computing paradigm that gives additional support to cloud environment by carrying out some local data analysis in edge of the devices, facilitating networking, computing, infrastructure and storage support as backbone
Rojalina Priyadarshini +1 more
doaj +1 more source
Scalable DDoS mitigation system for data centers [PDF]
Distributed Denial of Service attacks (DDoS) have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet.
Martinásek, Zdeněk
core +2 more sources
Detecting High and Low Intensity Distributed Denial of Service (DDoS) Attacks [PDF]
<p>High and low-intensity attacks are two common Distributed Denial of Service (DDoS) attacks that disrupt Internet users and their daily operations. Detecting these attacks is important to ensure that communication, business operations, and education facilities can run smoothly.
openaire +2 more sources
The increasing occurrence of Distributed Denial of Service (DDoS) attacks has caused significant disruptions in global network services, overwhelming targets by flooding them with requests from various sources.
Opeyemi Oreoluwa Asaolu +3 more
doaj +1 more source

