نتایج جستجو برای: ddos

تعداد نتایج: 2088  

2009
Anna T. Lawniczak Hao Wu Bruno N. Di Stefano

Distributed denial-of-service (DDoS) attacks are network-wide attacks that cannot be detected or stopped easily. They affect “natural” spatiotemporal packet traffic patterns, i.e. “natural distributions” of packets passing through the routers. Thus, they affect “natural” information entropy profiles, a sort of “fingerprints”, of normal packet traffic. We study if by monitoring information entro...

2017
Bruno Rodrigues Thomas Bocek Burkhard Stiller

Distributed Denial-of-Service (DDoS) defense systems are not capable of withstanding by themselves against large-scale attacks. Thus, coordinated protection efforts have become an attractive alternative to extend defense capabilities of a single system. However, existing DDoS signaling protocols are a bottleneck to make a coordinated and distributed defense fully operational. Blockchain technol...

2004
Shravan K Rayanchu Gautam Barua

Identifying the sources of a Distributed Denial-ofService (DDoS) attack is among the hardest problems in the Internet security area. Use of reflectors in a DDoS attack makes the problem particularly difficult as the actual sources of attack (slaves) are camouflaged. In this paper we propose a modification to the traceback of Multiple Hash DERM [13], an effective deterrent against DDoS attacks. ...

Journal: :JoWUA 2017
Abhishta Reinoud Joosten Lambert J. M. Nieuwenhuis

Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex problem. In this article we analyze the impact of 45 different DDoS attack announcements on victim fi...

Journal: :CoRR 2016
Michele Nogueira Lima

Distributed Denial of Service (DDoS) is a classic type of Cybercrime and can still strongly damage company reputation and increase costs. Attackers have continuously improved their strategies, and the amount of unleashed communication requests has doubled in volume, size and frequency. This has occurred through different isolated hosts, leading them to resource exhaustion. Previous studies have...

2011
Vidya Jadhav Prakash Devale

Some of the hardest to mitigate distributed denial of service attacks (DDoS) are ones targeting the application layer. Over the time, researchers proposed many solutions to prevent denial of service attacks (DDoS) from IP and TCP layers instead of the application layer. New application Layer based DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectabl...

2014
Nagaraju kilari

An Overview of DDoS Attacks in Cloud Environment Nagaraju kilari Department of Computer Science, Garden City College, Bangalore, Karnataka, India. Email: [email protected] Dr. R. Sridaran Marwadi Education Foundation's Group of Institutions, Rajkot, Gujarat, India. Email: [email protected] ----------------------------------------------------------------------ABSTRACT-...

2011
Santosh Kumar Abhinav Bhandari

In this paper, we are going to present the simulation results of comparison of five queuing algorithms (Drop Tail, Fair Queuing, Stochastic Fair Queuing, Deficit Round Robin and Random Early Detection) using ns-2 as simulation environment. Comparison of the queuing algorithms is based on attack-intensity. We are checking the performance of each queuing algorithm on a particular queue limit agai...

2017
Rizwan ur Rahman Deepak Singh Tomar

Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring modul...

Journal: :CoRR 2016
Michele Nogueira Lima

Volumetric Distributed Denial of Service (DDoS) attacks have been a recurrent issue on the Internet. These attacks generate a flooding of fake network traffic to interfere with targeted servers or network links. Despite many efforts to detect and mitigate them, attackers have played a game always circumventing countermeasures. Today, there is an increase in the number of infected devices, even ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید