Multiplayer game for DDoS attacks resilience in ad hoc networks [PDF]
This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles.
Komninos, N. +2 more
core +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
Detection Method of DDoS Attack Based on Software Defined Network and Its Application [PDF]
According to the characteristics of Distributed Denial of Service(DDoS) attack and OpenFlow technology,this paper proposes a novel DDoS attack detection method based on Software Defined Network(SDN).It gets flow-table item installed in OpenFlow switch ...
LI Hefei,HUANG Xinli,ZHENG Zhengqi
doaj +1 more source
An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic [PDF]
Recently, a serious disturbance for network security could be a Distributed Denial of Service (DDoS) attack. The advent of technological era has also brought along the threat of DDoS attacks for a variety of services and applications that use the ...
Ahmed Khalaf, Bashar
core +1 more source
DDoS victim service containment to minimize the internal collateral damages in cloud computing [PDF]
Recent Distributed Denial of Service (DDoS) attacks on cloud services demonstrate new attack effects, including collateral and economic losses. In this work, we show that DDoS mitigation methods may not provide the expected timely mitigation due to the ...
Conti, M. +4 more
core +1 more source
Pendeteksian Serangan DDoS (Distributed Denial of Service) Menggunakan IDS (Intrusion Detection System) [PDF]
Teknologi informasi (TI) telah berkembang dengan pesat, terutama dengan adanya jaringan internet yang dapat memudahkan untuk melakukan komunikasi dengan pihak lain, dan penelitian ini di latar belakangi oleh permasalahan rendahnya tingkat pengetahuan ...
ACHMAD FAUJI HILMAWAN, 123040071 +2 more
core
Characterizing and mitigating the DDoS-as-a-Service phenomenon [PDF]
Distributed Denial of Service (DDoS) attacks are an increasing threat on the Internet. Until a few years ago, these types of attacks were only launched by people with advanced knowledge of computer networks.
Santanna, José Jair, Sperotto, Anna
core +3 more sources
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
Performance and security testing of network applications [PDF]
Cieľom tejto diplomovej práce je navrhnúť a realizovať bezpečnostný test na základe skúmania odolnosti testovaného zariadenia voči pôsobeniu distribuovaného útoku odoprenia služby DDoS SYN Flood.
Matej, Michal
core
Machine Learning DDoS Detection for Consumer Internet of Things Devices
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Apthorpe, Noah +2 more
core +1 more source

