Results 51 to 60 of about 20,777 (211)
The Wireless Sensor Network (WSN) has evolved into a new IoT scheme, and its adoption has no restrictions at present. Sadly, security has an impact on the network of wireless sensors, and Denial-of-Service (DOS) categories of attacks are security ...
Mohammed Abdulaziz Al-Naeem
doaj +1 more source
On the Efficacy of Live DDoS Detection with Hadoop
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core +1 more source
The dangers, directness, and purposes of online collective actions
Abstract Most research on online collective action investigates low‐effort, social media‐based actions rather than tactics with highly disruptive potential. To better account for the variety of forms of collective actions that use digital technologies, we conducted an open‐source intelligence search (Study 1a) and an expert consultation survey (Study ...
Catherine G. Lowery +2 more
wiley +1 more source
DoS and DDoS Attack Detection in IoT Infrastructure using Xception Model with Explainability
The denial of service (DoS) and distributed denial of service (DDoS) attacks are considered the most frequent attacks targeting the Internet of Things (IoT) network infrastructure globally.
Nelly Elsayed +2 more
doaj +1 more source
The Distributed Denial of Service (DDoS) attack has seriously impaired network availability for decades and still there is no effective defense mechanism against it. However, the emerging Software Defined Networking (SDN) provides a new way to reconsider
Shi Dong, Mudar Sarem
doaj +1 more source
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S. +2 more
core
HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks [PDF]
Distributed Denial of Service (DDoS) attack sare a frequent cyber attack vector which cause significant damage to computer systems. Hypertext Transfer Protocol(HTTP), which is the core communication protocol of the internet, has had a major upgrade and ...
Beckett, David, Sezer, Sakir
core +1 more source
Benchmarks for Evaluation of Distributed Denial of Service (DDOS) [PDF]
Abstract : The main goal of our work was to develop the benchmark suite for evaluation of defenses against distributed denial-of-service (DDoS) attacks. The desired features of the benchmark suite were the following: 1. Realistic topologies, legitimate and attack traffic are represented in the suite 2.
openaire +1 more source
Moral Tolerance: The Ethics of Social Punishment in Cases of Moral Disagreement
ABSTRACT In many practical contemporary contexts, people need to make correct ethical judgements about how to respond to perceived wrongdoing—in particular, whether to punish it or tolerate it. This judgement can be challenging when the wrongdoer does not accept the allegation of wrongdoing at the level of moral principle, holding that the type of ...
Hugh Breakey, Graham Wood
wiley +1 more source
Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF
Kubernetes is an orchestration tool that runs and manages container-based workloads. It works as a collection of different virtual or physical servers that support multiple storage capacities, provide network functionalities, and keep all containerized ...
Amin Sadiq +5 more
doaj +1 more source

