نتایج جستجو برای: حملات ddos

تعداد نتایج: 4084  

2004
Dimitris Gavrilis Ioannis G. Tsoulos Evangelos Dermatas

In this paper we present a robust neural network detector for Distributed Denial-of-Service (DDoS) attacks in computers providing Internet services. A genetic algorithm is used to select a small number of efficient features from an extended set of 44 statistical features, which are estimated only from the packet headers. The genetic evaluation produces an error-free neural network DDoS detector...

2006
Paulo Ayres Huizhong Sun H. Jonathan Chao Wing C. Lau

Distributed Denial of Service (DDoS) attacks have been a big threat to the Internet while no effective schemes have been proposed or deployed, leaving the Internet still vulnerable to such attacks. We propose a proactive DDoS defense scheme [Ki04] by having multiple routers form a defense perimeter. They collaboratively detect DDoS attacks, if exist, and differentiate attacking packets from goo...

2009
Ke Li Wanlei Zhou Shui Yu Bo Dai

In information theory, entropies make up of the basis for distance and divergence measures among various probability densities. In this paper we propose a novel metric to detect DDoS attacks in networks by using the function of order α of the generalized (Rényi) entropy to distinguish DDoS attacks traffic from legitimate network traffic effectively. Our proposed approach can not only detect DDo...

2011
B. B. Gupta P. K. Agrawal Anupama Mishra M. K. Pattanshetti

This paper presents a novel scheme to estimate strength of a DDoS attack using polynomial regression model. To estimate strength of attack, a relationship is established between strength of attack and observed deviation in sample entropy. Various statistical performance measures are used to evaluate the performance of the polynomial regression models. NS-2 network simulator on Linux platform is...

Journal: :Lecture Notes in Computer Science 2021

DDoS attacks remain a major security threat to the continuous operation of Internet edge infrastructures, web services, and cloud platforms. While large body research focuses on detection protection, date we ultimately failed eradicate altogether. Yet, landscape attack mechanisms is even evolving, demanding an updated perspective in wild. In this paper, identify up 2608 amplification at single ...

2010
M. H. Islam

Distributed denial of service (DDoS) attacks have become a major threat to organizations and especially to internet and intranet. In DDoS attacks targets are overwhelmed by sending an enormous amount of traffic from a number of attack sites. The major task of any defense system is to detect these attacks accurately and quickly, before it causes an unrecoverable loss. Most of the research in th...

2015
S. Umarani D. Sharmila

A Distributed Denial of Service (DDoS) attack is a major threat to cyber security. It originates from the network layer or the application layer of compromised/attacker systems which are connected to the network. The impact of this attack ranges from the simple inconvenience to use a particular service to causing major failures at the targeted server. When there is heavy traffic flow to a targe...

Journal: :I. J. Network Security 2017
Sunny Behal Krishan Kumar Monika Sachdeva

Millions of people across the globe access Internet-based applications and web services in their day to day activities. Distributed Denial of Service (DDoS) attack is one of the prominent attacks that cripple down the computing and communication resources of a web server hosting these services and applications. The situation turns further crucial when DDoS attacks are launch during similar look...

2016
WAEL ALOSAIMI

Network availability is threatened by the traditional Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. The risk is much increased with the emergence of the new computing paradigm of cloud computing. In this era, DDoS attacks can threaten the cloud sustainability by hitting its pricing model exploiting the cloud scalability feature. Therefore, a new phenomenon is emerged...

2007
Yun Huang Kenneth Hendricks Gary J. Koehler John Mote Gautam Ray Xianjun Geng Andrew B. Whinston

Dedication To Yuning and Kayla, for always supporting my endeavors. v Acknowledgements First and foremost, I would like to thank my advisor and dissertation chairman, Andrew B. Whinston who played an indispensable role in my intellectual development. I am truly grateful for his thoughtful insights into research as well as the invaluable constant support along the difficult trail of finishing my...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید