نتایج جستجو برای: ddos detection

تعداد نتایج: 567162  

2016
S. Fouzul Hidhaya

144 Abstract—With significant growth in Internet, many day-to-day life activities such as shopping, banking transactions, commerce and Learning, etc. are simplified and made possible with the help of web applications. To protect the user’s confidential information, many security mechanisms are developed using machine learning algorithms. For the past ten years, Application Layer DDoS attack is ...

2004
Dimitris Gavrilis Ioannis G. Tsoulos Evangelos Dermatas

In this paper we present a robust neural network detector for Distributed Denial-of-Service (DDoS) attacks in computers providing Internet services. A genetic algorithm is used to select a small number of efficient features from an extended set of 44 statistical features, which are estimated only from the packet headers. The genetic evaluation produces an error-free neural network DDoS detector...

Journal: :IAES International Journal of Artificial Intelligence 2021

<span id="docs-internal-guid-58e12f40-7fff-ea30-01f6-fbbed132b03c"><span>Nowadays, IoT devices are widely used both in daily life and corporate industrial environments. The use of these has increased dramatically by 2030 it is estimated that their usage will rise to 125 billion causing enormous flow information. It likely also increase distributed denial-of-service (DDoS) attack sur...

Journal: :International Journal of Computer Applications 2019

2014
Sonali Swetapadma Sahu Manjusha Pandey

A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of compromised systems attack a single target, thereby causin...

2003
Kai Hwang Pinalkumar Dave Sapon Tanachaiwiwat

This article presents a new defense system to protect network servers, network routers, and client hosts from becoming the handlers, Zombies, and victims of distributed denial-of-service (DDoS) flood attacks. The NetShield system was developed at USC to protect any IP-based public network over the Internet. We explore preventive and deterrent controls to remove system vulnerabilities on target ...

Journal: :CoRR 2011
Jaydip Sen

Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease and low costs of launching such attacks, supplemented by the current inadequate sate of any viable defense mechanism, have made them one of the top threats to the Internet community today. Since the increasing popularity...

Journal: :Journal of ISMAC The Journal of IoT in Social, Mobile, Analytics, and Cloud 2022

A Distributed Denial of Service (DDoS) attack is a type cyber-attack that attempts to interrupt regular traffic on targeted server by overloading the target. The system under DDoS remains occupied with requests from bots rather than providing service legitimate users. These kinds attacks are complicated detect and increase day day. In this paper, machine learning algorithm employed classify nor...

2011
Vidya Jadhav Prakash Devale

Some of the hardest to mitigate distributed denial of service attacks (DDoS) are ones targeting the application layer. Over the time, researchers proposed many solutions to prevent denial of service attacks (DDoS) from IP and TCP layers instead of the application layer. New application Layer based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectabl...

2011
Santosh Kumar Abhinav Bhandari

In this paper, we are going to present the simulation results of comparison of five queuing algorithms (Drop Tail, Fair Queuing, Stochastic Fair Queuing, Deficit Round Robin and Random Early Detection) using ns-2 as simulation environment. Comparison of the queuing algorithms is based on attack-intensity. We are checking the performance of each queuing algorithm on a particular queue limit agai...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید