Results 41 to 50 of about 20,777 (211)

Intrusion detection routers: Design, implementation and evaluation using an experimental testbed [PDF]

open access: yes, 2006
In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed.
Chan, EYK   +20 more
core   +2 more sources

Evaluation of Boruta algorithm in DDoS detection

open access: yesEgyptian Informatics Journal, 2023
Distributed Denial of Service (DDoS) is a type of attack that leverages many compromised systems or computers, as well as multiple Internet connections, to flood targeted resources simultaneously.
Noor Farhana   +3 more
doaj   +1 more source

Proactive detection of DDOS attacks in Publish-Subscribe networks [PDF]

open access: yes, 2016
Information centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) or Publish-Subscribe Internet Technology (PURSUIT) has been proposed as an important candidate for the Internet of the future.
Alarfaj, Fawaz   +4 more
core   +2 more sources

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Defending Against Denial of Service [PDF]

open access: yes, 2012
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...

core  

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Countering DDoS Attacks with Multi-Path Overlay Networks [PDF]

open access: yes, 2006
Distributed Denial of Service (DDoS) has emerged as a major threat to the operation of online network services [1, 2, 3]. Current forms of DDoS attacks implicate multiple groups of Internet machines that have been taken over and controlled by an attacker.
Keromytis, Angelos D., Stavrou, Angelos
core   +2 more sources

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Review of Recent Detection Methods for HTTP DDoS Attack

open access: yesJournal of Computer Networks and Communications, 2019
With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures.
Ghafar A. Jaafar   +2 more
doaj   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy