Results 51 to 60 of about 20,777 (211)

Prediction of Re-Occurrences of Spoofed ACK Packets Sent to Deflate a Target Wireless Sensor Network Node by DDOS

open access: yesIEEE Access, 2021
The Wireless Sensor Network (WSN) has evolved into a new IoT scheme, and its adoption has no restrictions at present. Sadly, security has an impact on the network of wireless sensors, and Denial-of-Service (DOS) categories of attacks are security ...
Mohammed Abdulaziz Al-Naeem
doaj   +1 more source

On the Efficacy of Live DDoS Detection with Hadoop

open access: yes, 2015
Distributed Denial of Service flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication ...
Ali, Usman, Hameed, Sufian
core   +1 more source

The dangers, directness, and purposes of online collective actions

open access: yesPolitical Psychology, EarlyView.
Abstract Most research on online collective action investigates low‐effort, social media‐based actions rather than tactics with highly disruptive potential. To better account for the variety of forms of collective actions that use digital technologies, we conducted an open‐source intelligence search (Study 1a) and an expert consultation survey (Study ...
Catherine G. Lowery   +2 more
wiley   +1 more source

DoS and DDoS Attack Detection in IoT Infrastructure using Xception Model with Explainability

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference
The denial of service (DoS) and distributed denial of service (DDoS) attacks are considered the most frequent attacks targeting the Internet of Things (IoT) network infrastructure globally.
Nelly Elsayed   +2 more
doaj   +1 more source

DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks

open access: yesIEEE Access, 2020
The Distributed Denial of Service (DDoS) attack has seriously impaired network availability for decades and still there is no effective defense mechanism against it. However, the emerging Software Defined Networking (SDN) provides a new way to reconsider
Shi Dong, Mudar Sarem
doaj   +1 more source

IoT Botnets Analysis [PDF]

open access: yes, 2017
A botnet is a set of connected devices which have been infected with malware that allows an attacker to gain remote control and coordinate their actions. Attackers most commonly use their botnets to launch DDoS (Distributed Denial of Service) attacks
Dushenok, M. S.   +2 more
core  

HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks [PDF]

open access: yes, 2017
Distributed Denial of Service (DDoS) attack sare a frequent cyber attack vector which cause significant damage to computer systems. Hypertext Transfer Protocol(HTTP), which is the core communication protocol of the internet, has had a major upgrade and ...
Beckett, David, Sezer, Sakir
core   +1 more source

Benchmarks for Evaluation of Distributed Denial of Service (DDOS) [PDF]

open access: yes, 2008
Abstract : The main goal of our work was to develop the benchmark suite for evaluation of defenses against distributed denial-of-service (DDoS) attacks. The desired features of the benchmark suite were the following: 1. Realistic topologies, legitimate and attack traffic are represented in the suite 2.
openaire   +1 more source

Moral Tolerance: The Ethics of Social Punishment in Cases of Moral Disagreement

open access: yesTheoria, EarlyView.
ABSTRACT In many practical contemporary contexts, people need to make correct ethical judgements about how to respond to perceived wrongdoing—in particular, whether to punish it or tolerate it. This judgement can be challenging when the wrongdoer does not accept the allegation of wrongdoing at the level of moral principle, holding that the type of ...
Hugh Breakey, Graham Wood
wiley   +1 more source

Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF

open access: yesApplied Sciences, 2023
Kubernetes is an orchestration tool that runs and manages container-based workloads. It works as a collection of different virtual or physical servers that support multiple storage capacities, provide network functionalities, and keep all containerized ...
Amin Sadiq   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy