نتایج جستجو برای: ddos detection

تعداد نتایج: 567162  

2012
R. Sukanesh

Hackers uses Distributed Denial of Service (DDoS) and leaves hundreds and thousands of bots to overwhelm the victim in terms of bandwidth and reduce the services that are rendering to the users. To initiate an attack against victim, hackers use the internet as their venue. To address this threat various methods were proposed, but all the earlier method identifies the DDoS attack that exists in ...

2012
Jose Anand K. Sivachandar

The Internet has experienced a tremendous expansion in its size and complexity since its commercialization. Internet hosts are threatened by large-scale Distributed Denial-ofService (DDoS) attacks in the network. DDoS attacks typically rely on compromising a large number of hosts to generate traffic to a single destination node. Thus the severity of DDoS attacks will likely increase to the poss...

2017
Zhongqing Wang Yue Zhang

Distributed Denial of Service (DDoS) attacks have been significant threats to the Internet. Traditional research in cyber security focuses on detecting emerging DDoS attacks by tracing network package flow. A characteristic of DDoS defense is that rescue time is limited since the launch of attack. More resilient detection and defence models are typically more costly. We aim at predicting the li...

Journal: :JNW 2014
Hongxia Shi

Recently, intrusion detection research has make some important achievements. A variety of classical machine learning and entropy analyze algorithms has been applied to intrusion detection with varying levels of success. In this paper, we analyze the traffic connection statistics information, and give the definition the In/Out flows normal and abnormal statue. To calculate two classes probabilit...

Journal: :Future Internet 2016
Xuan Dau Hoang Pham Hong Ky

On the high-speed connections of the Internet or computer networks, the IP (Internet Protocol) packet traffic passing through the network is extremely high, and that makes it difficult for network monitoring and attack detection applications. This paper reviews methods to find the high-occurrence-frequency elements in the data stream and applies the most efficient methods to find Hot-IPs that a...

2016
M. Kalaiselvi S. Priya

In networking, the DDOS threat is major concern which creates the severe attack between the server and users. The internet attacks’ circumstance is increasing in the direction of a distributed, mutual direction. Attacks of internet drain a lot of resources; creation of the victim host cannot accept normal network requests take up a grouping of bandwidth, resulting in substantial losses of econo...

2013
Surender Singh Sandeep Jain

Web-sites acts as the best platforms for attacks like DDOS attack worm propagation and many other attacks which are related to application layer. To detect application layer DDOS attack is a cumbersome task. It is basically originated from the lower layer i.e. network layer and transport layer. Whereas this new application layer based DDOS attacks utilizes genuine HTTP request to make victim re...

2013
Vijay D. Katkar Rohan P. Petare Yogesh P. Jagdale Raviraj B. Mohite

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack exhausts the resources of server/service and makes it unavailable for legitimate users. It can result in huge loss of money. With increasing use of online services and attacks on these services, the necessity of Intrusion Detection System (IDS) for detection of DoS/DDoS attacks has also marked by organizations. Different te...

Journal: :International Journal of Intelligent Systems 2023

Existing application-layer distributed denial of service (AL-DDoS) attack detection methods are mainly targeted at specific attacks and cannot effectively detect other types AL-DDoS attacks. This study presents an protocol communication model for detection, based on the explicit duration recurrent network (EDRN). The proposed method includes training detection. In phase, output each observation...

2013
Shui Yu Yonghong Tian Dapeng Oliver Wu

DDoS attacks aim to exhaust the resources of victims, such as network bandwidth, computing power and operating system data structures. Early DDoS attacks emerged around the year 2000, and well-known web sites, such as CNN, Amazon and Yahoo, have been the targets of hackers since then. The purpose of early attacks was mainly for fun and curiosity about the technique. However, recently we have wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید