نتایج جستجو برای: ddos attack

تعداد نتایج: 81369  

2002
Noureldien A. Noureldien

Recently many prominent web sites face a new type of denial of service attack known as Distributed Denial of Service attack (DDoS). Organizations deploying security measures such as firewalls, and intrusion detection systems could face the traditional DoS attack. Yet there is no complete solution neither for protection from DDoS attack, nor for preserving network hosts from participating in suc...

2004
Stephen M. Specht Ruby B. Lee

Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against primary victim systems. As new countermeasures are developed to prevent or mitigate DDoS attacks, attackers are constantly developing new methods to circumvent ...

Journal: :Int. Journal of Network Management 2005
Yuh-Min Tseng

Malicious intruders may launch as many invalid requests as possible without establishing a server connection to bring server service to a standstill. This is called a denial-of-service (DoS) or distributed DoS (DDoS) attack. Until now, there has been no complete solution to resisting a DoS/DDoS attack. Therefore, it is an important network security issue to reduce the impact of a DoS/DDoS attac...

Journal: :Comput. J. 2014
Monowar H. Bhuyan Hirak Kashyap Dhruba Kumar Bhattacharyya Jugal K. Kalita

The minimal processing and best-e↵ort forwarding of any packet, malicious or not, was the prime concern when the Internet was designed. This architecture creates an unregulated network path, which can be exploited by any cyber attacker motivated by revenge, prestige, politics or money. Denial-of-service (DoS) attacks exploit this to target critical Web services [1, 2, 3, 4, 5]. This type of att...

Journal: :Security and Communication Networks 2016
Monowar H. Bhuyan Dhruba Kumar Bhattacharyya Jugal K. Kalita

Distributed denial-of-service (DDoS) attacks cause havoc by exploiting threats to Internet services. In this paper, we propose E-LDAT, a lightweight extended-entropy metric-based system for both DDoS flooding attack detection and IP (Internet Protocol) traceback. It aims to identify DDoS attacks effectively by measuring the metric difference between legitimate traffic and attack traffic. IP tra...

2017
Rizwan ur Rahman Deepak Singh Tomar

Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring modul...

2015
Sandeep Shinde

Mobile ad-hoc network is integration of node which is scatterd around the network. Every node in mobile ad-hoc netowk is configured by own, it also decentralized and less secure. Due to mobability properties of mobile ad-hoc network every node in mobile network move around the network. The DDOS attack is the major security in the mobile ad-hoc network. The DDOS attack it generate huge unwanted ...

2003
Jiejun Kong Mansoor Mirza James Shu Christian Yoedhana Mario Gerla Songwu Lu

Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to availability of Internet services. In this paper, we study and evaluate DDoS attacks in a random flow network model, a novel and general approach to DDoS attack prevention and tolerance. The model can be used to evaluate the effectiveness of a DDoS countermeasure framework. Following the random flow netw...

2013
Shweta Tripathi Brij Gupta Ammar Almomani Anupama Mishra Suresh Veluru

Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of flooding the victim network with an enormous number of packets, hence exhausting the resources and preventing the legitimate users to access them. After having standard DDoS defens...

Journal: :I. J. Network Security 2017
Sunny Behal Krishan Kumar

Distributed Denial of Service (DDoS) attack imposes a severe threat to the extensively used Internet based services like e-commerce, e-banking, transportation, medicine, education etc. Hackers compromises the vulnerable systems for launching DDoS attacks in order to degrade or sometimes completely disrupt such services. In recent years, DDoS attacks have been increased in frequency, sophisticat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید