نتایج جستجو برای: ddos

تعداد نتایج: 2088  

2014
B. Ashok V. Sucharitha

Abstract: Cloud computing provides multiple services to the cloud users, particularly in Infrastructure as a service (Ias) clouds user may install vulnerable software on their virtual machines. Attackers exploit these virtual machines to compromise as zombie and by using it attacker can perform Distributed denial of service (DDOS) attacks. The Distributed Denial of service attacks (DDOS) caused...

2013
Tong Guang NI Xiao Qing GU Hong Yuan WANG

Domain Name System (DNS) Service is the basic support of Internet, which security plays a vital role in the entire Internet. Because DNS requests and responses are mostly UDP-based, and the existing large numbers of open recursive DNS servers, it is vulnerable to distributed denial of services (DDoS) attacks. Through the analysis of several aspects of these attacks, a novel approach to detect D...

2005
Jung-Taek Seo Cheolho Lee Taeshik Shon Kyuhyung Cho Jongsub Moon

Recently, many attack detection methods adopts machine learning algorithm to improve attack detection accuracy and automatically react to the attacks. However, the previous mechanisms based on machine learning have some disadvantages such as high false positive rate and computing overhead. In this paper, we propose a new DDoS detection model based on multiple SVMs (Support Vector Machine) in or...

2011
Nitin Gupta Meenu Dhiman

This paper proposes a study of distributed denial-of service attacks and a study of the defense mechanism that strive to counter these attacks. The attack illustrate do using both known and potential attack mechanisms along with this classification we discuss important feature .So each attack category that in turn define the challenge involved in combating these threats. Distributed Denial of S...

Journal: :CoRR 2017
Rup Kumar Deka Dhruba Kumar Bhattacharyya Jugal Kumar Kalita

The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world. The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks. Such attacks are arguably more dangerous in private individual clouds with limited resources. This paper discusses several pro...

Journal: :IJCIP 2013
Béla Genge Christos Siaterlis

Modern critical infrastructures such as the power grid are frequently targeted by distributed denial-of-service (DDoS) attacks. Unlike traditional information and communications systems, where the effects of DDoS attacks are mostly limited to the cyber realm, disruptive attacks on critical infrastructure assets can result in the loss of vital services such as transportation and health care. Thi...

Journal: :CoRR 2012
B. B. Gupta Ramesh Chandra Joshi Manoj Misra

— The significance of the DDoS problem and the increased occurrence, sophistication and strength of attacks has led to the dawn of numerous prevention mechanisms. Each proposed prevention mechanism has some unique advantages and disadvantages over the others. In this paper, we present a classification of available mechanisms that are proposed in literature on preventing Internet services from p...

2003
Laura Feinstein Dan Schnackenberg Ravindra Balupari Darrell Kindred

The nature of the threats posed by Distributed Denial of Service (DDoS) attacks on large networks, such as the Internet, demands effective detection and response methods. These methods must be deployed not only at the edge but also at the core of the network. The DDoS Tolerant Networks technology incorporates methods to detect, characterize, and respond to DDoS attacks by computing entropy and ...

2015
An Wang Aziz Mohaisen Wentao Chang Songqing Chen

Despite continuous defense efforts, DDoS attacks are still very prevalent on the Internet. In such arms races, attackers are becoming more agile and their strategies are more sophisticated to escape from detection. Effective defenses demand in-depth understanding of such strategies. In this paper, we set to investigate the DDoS landscape from the perspective of the attackers. We focus on the dy...

2016
S. Fouzul Hidhaya

144 Abstract—With significant growth in Internet, many day-to-day life activities such as shopping, banking transactions, commerce and Learning, etc. are simplified and made possible with the help of web applications. To protect the user’s confidential information, many security mechanisms are developed using machine learning algorithms. For the past ten years, Application Layer DDoS attack is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید