نتایج جستجو برای: denial of service
تعداد نتایج: 21193855 فیلتر نتایج به سال:
Distributed denial of service (DDoS) attacks is one the most destructive cyber which target availability system when legitimate users try to access system. Not only computers, but also growing number smartphones as well Internet Things (IoT) devices are affected by DDoS attacks. There no well-known effectively stops or prevents Designing an effective detector with high accuracy low computationa...
Abstract Currently, Distributed Denial of Service Attacks are the most dangerous cyber danger. By inhibiting server's ability to provide resources genuine customers, affected resources, such as bandwidth and buffer size, slowed down. A mathematical model for distributed denial-of-service attacks is proposed in this study. Machine learning algorithms Logistic Regression Naive Bayes, used detect ...
Abstract Conventional wisdom expects to see a rise in cyber activities around aggressive foreign policy events. In this article, I test claim by investigating whether sanctions lead an increase denial-of-service (DoS) attacks using new data on DoS measured from Internet traffic. Exploring the development of imposed against Russia 2014 indeed shows several sanction sender states. Extending case ...
As the world becomes increasingly connected and number of users grows exponentially “things” go online, prospect cyberspace becoming a significant target for cybercriminals is reality. Any host or device that exposed on internet prime cyberattacks. A denial-of-service (DoS) attack accountable majority these Although various solutions have been proposed by researchers to mitigate this issue, alw...
A high profile internet server is always a target of denial-of-service attacks. In this paper, we propose a novel technique for protecting an internet server from distributed denial-of-service attacks. The defense mechanism is based on a distributed algorithm that performs weight-fair throttling at the upstream routers. The throttling is weight-fair because the traffics destined for the server ...
Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید