منابع مشابه
Dual-Level Defense Framework for DDoS Attacked Network
DDoS has become one of the thorniest problems in the Internet, and aims to deny legitimate users of the services they should have. In this paper, we introduce novel dual level framework that consist of attack detection (D-LAD) and characterization scheme for defending against the DDoS attacks. The macroscopic level detectors (MaLAD) attempt to detect voluminous congestion inducing attacks which...
متن کاملDual Z-Source Network Dual-Input Dual-Output Inverter
This paper presents a modified nine switch inverter with two inputs and two Z-source networks. This inverter has two DC inputs and two AC outputs. Input DC voltages can be boosted to the required level. Amplitude, frequency and phase of AC output voltages can be controlled, independently. The proposed converter can be used in applications with two unregulated DC sources, which require feeding ...
متن کاملOptimizing Active Cyber Defense
Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading “white” or “benign” worms to combat against the attackers’ malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of optimal a...
متن کاملEvolving Active Defense Strategies
Active defense is a security tool that has not received much attention in research. However, it is an important topic that needs to be discussed because although not generally accepted, is still utilized informally. The largest problem facing active defense is determining what actions to take and when to take them given the risks of the actions and the risk of the threats. In this paper, compet...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SCIENTIA SINICA Informationis
سال: 2018
ISSN: 1674-7267
DOI: 10.1360/n112017-00171