نتایج جستجو برای: ddos detection

تعداد نتایج: 567162  

Journal: :Computers, materials & continua 2022

Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and operation over infrastructure. The SDN controller is considered as the operating system of based infrastructure, responsible for executing different applications maintaining services functionalities. Despite all its tremendous capabilities, face many security issues due to comple...

Journal: :Informatica (Slovenia) 2010
Zhengmin Xia Songnian Lu Jianhua Li Junhua Tang

Distributed denial-of-service (DDoS) flood attack remains great threats to the Internet. This kind of attack consumes a large amount of network bandwidth or occupies network equipment resources by flooding them with packets from the machines distributed all over the world. To ensure the network usability and reliability, real-time and accurate detection of these attacks is critical. To date, va...

2015
Rishikesh Sahay Gregory Blanc Zonghua Zhang Hervé Debar

Distributed Denial of Service attacks (DDoS) have remained as one of the most destructive attacks in the Internet for over two decades. Despite tremendous efforts on the design of DDoS defense strategies, few of them have been considered for widespread deployment due to strong design assumptions on the Internet infrastructure, prohibitive operational costs and complexity. Recently, the emergenc...

2002
Tao Peng Christopher Leckie Kotagiri Ramamohanarao

In this paper, we introduce a router-based system to defend against Distributed Denial of Service (DDoS) attacks. DDoS attacks are treated as a congestioncontrol problem. The main issue is to identify the congestion and then pushback a packet filter to the router closest to the source that causes congestion. Unlike previous approaches, we propose an anomaly detection scheme using source informa...

2005
Gerhard Münz Ali Fessi Georg Carle Yannick Carlinet Jan van Lunteren Patricia Sagmeister Gero Dittmann

High-profile web servers often become the victim of web server overload Distributed Denial-of-Service (DDoS) attacks. Motivations of such attacks range from technical challenge (e.g. script kiddies) to financial profit (e.g. blackmailing the web server’s owner). This paper presents the DIADEM Firewall architecture that allows an ISP to protect its customers from being the target of a DDoS attac...

2006
Xinyu Yang Wenjing Yang Yi Shi Yage Gong

DDoS (Distributed Denial of Service) attack is being the most extensive danger and difficulty to defense. A new kind of DDoS attack named DRDoS (Distributed Reflector Denial of Service) appears in recent years, which is more dangerous than DDoS attack because it is in stronger disguise. In this paper, the principle of DRDoS attack is studied and the network traffic is analyzed by fuzzy associat...

2012
Alina Madalina Lonea Daniela E. Popescu Octavian Prostean Huaglory Tianfield

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks appear to be main threats for cloud computing. The protection of cloud services against DoS and DDoS attacks is realized using Intrusion Detection Systems (IDSs).This paper aims to evaluate the experimental results of our proposed quantitative solution. The experiments are performed in a private cloud model deployed using ...

Journal: :IJWMC 2007
Udaya Kiran Tupakula Vijay Varadharajan Ashok Kumar Gajam Sunil Kumar Vuppala Pandalaneni Naga Srinivasa Rao

Earlier, we have proposed an automated model to minimise DDoS attacks in single ISP domain and extended the model to multiple ISP domains. Our approach has several advanced features to minimise DDoS attacks in the internet. The focus of this paper is twofold: firstly, to present a detailed description of the design and implementation of the proposed model and second to discuss and analyse the e...

Journal: :J. UCS 2009
Chin-Ling Chen

This study has proposed a new detection method for DDoS attack traffic based on two-sample t-test. We first investigate the statistics of normal SYN arrival rate (SAR) and confirm it follows normal distribution. The proposed method identifies the attack by testing 1) the difference between incoming SAR and normal SAR, and 2) the difference between the number of SYN and ACK packets. The experime...

2004
Lukas Ruf Arno Wagner Károly Farkas Bernhard Plattner

Distributed denial of service (DDoS) attacks in the Internet pose huge problems on nowadays communication infrastructure. Attacks either destroy information or impede access to a service. Since the significance of the Internet to business and economy is growing rapidly, efficient protection mechanisms are urgently required to protect hosts from being infected and, more important, sites from bei...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید