نتایج جستجو برای: ddos attack

تعداد نتایج: 81369  

2012
Jose Anand K. Sivachandar

The Internet has experienced a tremendous expansion in its size and complexity since its commercialization. Internet hosts are threatened by large-scale Distributed Denial-ofService (DDoS) attacks in the network. DDoS attacks typically rely on compromising a large number of hosts to generate traffic to a single destination node. Thus the severity of DDoS attacks will likely increase to the poss...

2013
J. Udhayan Rajesh Babu

Resource of victim impounded by DDoS attack leads the victim to series monetary loss apart from various other ill-effects. Already lot of solutions came up in technological aspects almost neglecting the economical aspects. Hence there is not yet a proper method to make the zombies accountable to the economical loss materialized as the effects of highly zombie oriented DDoS attacks. Therefore th...

2013
C Balarengadurai S Saraswathi

Detection and Prediction mechanism against distributed denial of service (DDoS) attacks is a critical component of any security system in which, these attacks can affect the availability of a node or an entire network. In this work, we focus the detection and prediction mechanism against DDoS attacks in IEEE 802.15.4 using Fuzzy logic system. The main contribution of Fuzzy based detection and p...

Journal: :JSW 2014
Chuibi Huang Jinlin Wang Gang Wu Jun Chen

Distributed Denial of Service (DDoS) attacks have caused continuous critical threats to the Internet services. DDoS attacks are generally conducted at the network layer. Many DDoS attack detection methods are focused on the IP and TCP layers. However, they are not suitable for detecting the application layer DDoS attacks. In this paper, we propose a scheme based on web user browsing behaviors t...

2004
Erol Gelenbe Michael Gellman George Loukas

Denial of service attacks, viruses and worms are common tools for malicious adversarial behaviour in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile beha...

2014
Ming Li Wei Zhao Tomas Pereira Shengyong Chen

Reliable distinguishing DDOS flood traffic from aggregated traffic is desperately desired by reliable prevention of DDOS attacks. By reliable distinguishing, we mean that flood traffic can be distinguished from aggregated one for a predetermined probability. The basis to reliably distinguish flood traffic from aggregated one is reliable detection of signs of DDOS flood attacks. As is known, rel...

Journal: :IJISP 2014
M. Poongodi Sundan Bose

Distributed Denial of Service (DDOS) attacks are the major concern for security in the collaborative networks. Although non DDOS attacks are also make the network performances poor, the effect of DDOS attacks is severe. In DDOS attacks, flooding of the particular node as victim and jam it with massive traffic happens and the complete network performance is affected. In this paper, a novel Intru...

2011
Abhinav Bhandari Amrit Lal Sangal Krishan Kumar Saluja

Distributed Denial of Service (DDoS) attack is one of the biggest threats now days. This paper aims at providing the simulation results of buffer size and attack intensities effect on various queuing algorithms such as DropTail, Fair Queuing (FQ), Stochastic Fair Queuing (SFQ), Deficit Round Robin (DRR) and Random Early Detection (RED) using ns-2 as a simulation environment. The results in this...

Journal: :IJMCMC 2011
Anjali Sardana Ramesh Chandra Joshi

DDoS attacks aim to deny legitimate users of the services. In this paper, the authors introduce dual level attack detection (D-LAD) scheme for defending against the DDoS attacks. At higher and coarse level, the macroscopic level detectors (MaLAD) attempt to detect congestion inducing attacks which cause apparent slowdown in network functionality. At lower and fine level, the microscopic level d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید