نتایج جستجو برای: ddos attack

تعداد نتایج: 81369  

2013
Daljeet Kaur Monika Sachdeva

Distributed Denial of Service (DDoS) attacks is virulent, relatively new type of attacks on the availability of Internet services and resources. DDoS attackers infiltrate large number of computers by exploiting software vulnerabilities, to set up DDoS attack networks. DDoS attacks pose an immense threat to the Internet, therefore some defense systems are required to defend these attacks. In thi...

Journal: :Neurocomputing 2016
Alan Saied Richard E. Overill Tomasz Radzik

The key objective of a Distributed Denial of Service (DDoS) attack is to compile multiple systems across the Internet with infected zombies/agents and form botnets of networks. Such zombies are designed to attack a particular target or network with different types of packets. The infected systems are remotely controlled either by an attacker or by self-installed Trojans (e.g. roj/Flood-IM) that...

Journal: :IJCNIS 2013
N. Jeyanthi N. Ch. Sriman Narayana Iyengar P. C. Mogan Kumar A. Kannammal

Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss of sensitive information, Data corruption and even rarely lead to service shutdown. Entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of incoming traffic. Heuristic data helps in ...

2013
Surender Singh Sandeep Jain

Web-sites acts as the best platforms for attacks like DDOS attack worm propagation and many other attacks which are related to application layer. To detect application layer DDOS attack is a cumbersome task. It is basically originated from the lower layer i.e. network layer and transport layer. Whereas this new application layer based DDOS attacks utilizes genuine HTTP request to make victim re...

2003
Lan Li Gyungho Lee

This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification. Network traffic characterization with behavior modeling could be a good guidance of attack detection. Aggregated traffic has been found to be s...

2015
Sidharth Sharma Sanjay Kumar Jena

Cloud Computing has evolved as a new paradigm in which users can use on-demand services, according to their needs. However, security concerns are primary obstacles to a wider adoption of clouds. Newly born concepts that clouds introduced, such as multitenancy, resource sharing and outsourcing, create new challenges for the security research. DDoS (Distributed Denial of service) attack is the bi...

Journal: :CoRR 2007
Dhinaharan Nagamalai Beatrice Cynthia Dhinakaran Jae-Kwang Lee

Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and spammers. Distributed Denial of service attacks are becoming more c...

Journal: :International Journal of Future Computer and Communication 2013

Journal: :CoRR 2006
Karim M. El Defrawy Athina Markopoulou Katerina J. Argyraki

Distributed Denial-of-Service (DDoS) attacks are a major problem in the Internet today. In one form of a DDoS attack, a large number of compromised hosts send unwanted traffic to the victim, thus exhausting the victim’s resources and preventing it from serving its legitimate clients. One of the main mechanisms that have been proposed to deal with DDoS is filtering, which allows routers to selec...

Journal: :Entropy 2016
Khundrakpam Johnson Singh Khelchandra Thongam Tanmay De

Distributed denial-of-service (DDoS) attack is one of the major threats to the web server. The rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in current intrusion detection systems or intrusion prevention systems (IDS/IPS), mostly caused by application-layer DDoS attacks. Within this context, the objective of the paper is to detect a DDoS attack using a m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید