نتایج جستجو برای: ddos detection

تعداد نتایج: 567162  

Journal: :Computers & Security 2004
Ming Li

In the aspect of intrusion detection, reliable detection remains a challenge issue as stated in Kemmrer and Vigna (Suppl IEEE Comput (IEEE Secur Priv) 35(4) (2002) 28). ‘‘The challenge is to develop a system that detects close to 100% of attacks with minimal false positives. We are still far from achieving this goal.’’ Hence, reliable detection of distributed denial-of-service (DDOS) attacks is...

Journal: :International Journal of Advances in Applied Sciences 2023

<span>This study proposes a continuous mechanism for detecting distributed denial of service (DDoS) attacks from network traffic data. The aims to systematically organise data and prepare them DDoS attack detection using convolutional deep-learning neural networks. proposed contains ten phases covering activities, including preprocessing, feature selection, labelling, model building, eval...

2017
R. Obulakonda Reddy R. Nagarjuna Reddy M. Radha N. Sree Vani B. Srinivasulu

Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new application-layer-based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. The case may be more serious when such attacks mimic or occur during the flash crowd event of a popular Website. Focusing on the detection for suc...

2007
Vrizlynn L. L. Thing Morris Sloman Naranker Dulay

In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting in attack tools becoming more powerful. Developing new techniques for detecting and responding to the latest DDoS attacks often entails using attack traces to determine attack signatures and to test the techniques. However, obta...

Journal: :CoRR 2015
Hamed Rezaei Nima Ghazanfari Motlagha Yaghoub Farjami Mohammad Hossein Yektaei

It is not been a long time since the advent of cloud-based technology. However, in this short period of time several advantages and disadvantages have been emerged. This is a problem solving technology with some threats as well. These threats and potential damages are not only limited to the cloud-based technologies, but they have always been against computer network infrastructures. One of the...

2014
K. Senthil Raja

Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such as multi step exploitation, low frequency vuln...

Journal: :Journal of Physics: Conference Series 2020

Journal: :Iraqi Journal of Information & Communications Technology 2021

Journal: :International Journal of Information Privacy, Security and Integrity 2017

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید