نتایج جستجو برای: ddos attacks

تعداد نتایج: 57960  

Journal: :IOP Conference Series: Materials Science and Engineering 2017

2003
João B. D. Cabrera Lundy M. Lewis Xinzhou Qin Carlos Gutiérrez Wenke Lee Raman K. Mehra

In our earlier work we have proposed and developed a methodology for the early detection of Distributed Denial of Service (DDoS) attacks. In this paper, we examine the applicability of Proactive Intrusion Detection on a considerably more complex set-up, with hosts associated with three clusters, connected by routers. Background TCP, UDP and ICMP traffic following Interrupted Poisson Processes a...

2009
Fang-Yie Leu

Nowadays, DDoS is one of the most troublesome attacks. Attackers often penetrate innocent routers and hosts to make them unwittingly participate in such large-scale attacks acting as zombies or reflectors. Also, the Internet consists of autonomous network management units. Organizing these units is helpful in detecting DDoS attacks if several adjacent or nearby network management units could co...

2009
S. Karthik Dr. V. P. Arunachalam Dr. T. Ravichandran

Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. IP traceback – the ability to trace IP packets from source to destination – is a significant step toward identifying and, thus, stopping, attackers. The IP traceback is an important mechanism in defending against distributed denialof-servic...

2013
Abdul Wali Khan Muhammad Zakarya

DDoS attacks on the World Wide Web in broad-spectrum and predominantly in modern cloud computing has become a noticeable issue for researchers in academia and industry related to the field of computer sciences. DDoS attacks are cool to provoke but their uncovering is a very challenging and dingy task and therefore, an eye-catching weapon for hackers. Hence DDoS torrents do not have familiar app...

2007
Mihui Kim Jaewon Seo Kijoon Chae

The distributed denial of service (DDoS) attack that is one of the most threatening attacks in the wired network has been already extended in the wireless mobile network, owing to the appearance of DDoS attack tool against mobile phone. In the future, the latent threats for the converged form of DDoS attack should be resolved for the induction of successful convergence network. However, because...

Journal: :J. Information Security 2011
Hari Krishna Vellalacheruvu Sanjeev Kumar

Recent DDoS attacks against several web sites operated by SONY Playstation caused wide spread outage for several days, and loss of user account information. DDoS attacks by WikiLeaks supporters against VISA, MasterCard, and Paypal servers made headline news globally. These DDoS attack floods are known to crash, or reduce the performance of web based applications, and reduce the number of legiti...

2013
J. Udhayan Rajesh Babu

Resource of victim impounded by DDoS attack leads the victim to series monetary loss apart from various other ill-effects. Already lot of solutions came up in technological aspects almost neglecting the economical aspects. Hence there is not yet a proper method to make the zombies accountable to the economical loss materialized as the effects of highly zombie oriented DDoS attacks. Therefore th...

2017
Zhongqing Wang Yue Zhang

Distributed Denial of Service (DDoS) attacks have been significant threats to the Internet. Traditional research in cyber security focuses on detecting emerging DDoS attacks by tracing network package flow. A characteristic of DDoS defense is that rescue time is limited since the launch of attack. More resilient detection and defence models are typically more costly. We aim at predicting the li...

2015
R. Kesavamoorthy

One of the great threat to service availability in cloud computing is Distributed Denial of Service. Here a novel approach has been proposed to minimize DDoS attacks. This has been planned to achieve by an intelligent fastflux swarm network. An intelligent swarm network is required to ensure autonomous coordination and allocation of swarm nodes to perform its relaying operations. Intelligent Wa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید