نتایج جستجو برای: ddos attack

تعداد نتایج: 81369  

Journal: :International Journal of Computer Applications 2016

2016
AKASHDEEP BHARDWAJ GVB SUBRAHMANYAM VINAY AVASTHI HANUMAT SASTRY SAM GOUNDAR

Cloud computing has started to gain acceptance for adoption and implementation among organizations, however, this new technology area has already started to deal with security, performance and availability challenges. Within Cloud Security issues being paramount for the corporates, private enterprises, the denial of service attacks are rated as the highest priority threat to the cloud environme...

2008
MING LI WEI ZHAO

Distributed denial-of-service (DDOS) flood attacks remain a big issue in network security. Real events of DDOS flood attacks show that an attacked site (e.g., server) usually may not be overwhelmed immediately at the moment attack packets arrive at that site but sometime late. Therefore, a site has a performance to resist DDOS flood attacks. To test such a performance, data synthesizer is desir...

2006
Chris Kommareddy

Title of dissertation: DETECTING DDoS ATTACKS IN STUB DOMAINS Christopher Kommareddy, Doctor of Philosophy, 2006 Dissertation directed by: Prof. Samrat Bhattacharjee Department of Computer Science Dr. Richard La Department of Electrical & Computer Engineering DoS attacks have least impact when detected and mitigated close to the attacks’ source. This is more important for Distributed DoS (DDoS)...

2010
Joseph Latanicki Philippe Massonet Syed Naqvi Benny Rochwerger Massimo Villari

Distributed denial of service (DDoS) is considered as one of the most serious threats to emerging cloud computing infrastructures. It aims at denying access to the cloud infrastructure by making it unavailable to its users. This can cause important economic and organizational damage depending on the type of applications running on the cloud that have become unavailable. This paper proposes an e...

2015
Kirtesh Agrawal Nikita Bhatt

Cloud computing has become popular and a huge platform for computing where large number of data are available online. Nature of cloud computing is distributed, due to this kind of nature they have become easy target for attackers to exploits the security vulnerability. Availability of data is most important part of cloud computing and even for economic growth of the society. Attack name Denial ...

2003
Vladimir I. Gorodetsky Igor V. Kotenko

The move toward practical use of modern naval network-centric warfare (NCW) brings with it the benefits caused by applying distributed computing to gain superiority over its adversary. However, the adversary will attempt to attack information infrastructures used in NCW. One effective means of destruction of such infrastructures is the use of distributed denial-of-service (DDoS) attacks. The pr...

2015
Keisuke Kato Vitaly Klyuev

Nowadays, many companies and/or governments require a secure system and/or an accurate intrusion detection system (IDS) to defend their network services and the user’s private information. In network security, developing an accurate detection system for distributed denial of service (DDoS) attacks is one of challenging tasks. DDoS attacks jam the network service of the target using multiple bot...

Journal: :I. J. Network Security 2011
J. Udhayan Thiagarajan Hamsapriya

DDoS attack aims at occupying the victim resources so as to defy the legitimate requests from reaching it. Even though the attack traffic is generated in intimidating measures, the attack traffic mostly is disguised as the genuine traffic. Hence most of the mitigation methods cannot segregate the legitimate flows from the attack flows accurately. As the result, legitimate flows have also been f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید