نتایج جستجو برای: ddos detection
تعداد نتایج: 567162 فیلتر نتایج به سال:
In the aspect of intrusion detection, reliable detection remains a challenge issue as stated in Kemmrer and Vigna (Suppl IEEE Comput (IEEE Secur Priv) 35(4) (2002) 28). ‘‘The challenge is to develop a system that detects close to 100% of attacks with minimal false positives. We are still far from achieving this goal.’’ Hence, reliable detection of distributed denial-of-service (DDOS) attacks is...
<span>This study proposes a continuous mechanism for detecting distributed denial of service (DDoS) attacks from network traffic data. The aims to systematically organise data and prepare them DDoS attack detection using convolutional deep-learning neural networks. proposed contains ten phases covering activities, including preprocessing, feature selection, labelling, model building, eval...
Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website. Focusing on the detection for suc...
In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting in attack tools becoming more powerful. Developing new techniques for detecting and responding to the latest DDoS attacks often entails using attack traces to determine attack signatures and to test the techniques. However, obta...
It is not been a long time since the advent of cloud-based technology. However, in this short period of time several advantages and disadvantages have been emerged. This is a problem solving technology with some threats as well. These threats and potential damages are not only limited to the cloud-based technologies, but they have always been against computer network infrastructures. One of the...
Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multi step exploitation, low frequency vuln...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید