نتایج جستجو برای: ddos attacks

تعداد نتایج: 57960  

2007
Rabia Sirhindi Asma Basharat Ahmad Raza Cheema

Distributed denial-of-service attacks (DDoS) impose a great threat to the availability of resources. Not only is the attack difficult to carryout but also the methods and techniques used to prevent these attacks are so complex that it makes the job to protect the resources even harder. An analysis is carried out for various approaches of detection and prevention systems that can be deployed to ...

Journal: :Expert Syst. Appl. 2004
Shun-Chieh Lin Shian-Shyong Tseng

Intrusion tolerance is the ability of a system to continue providing (possibly degraded but) adequate services after a penetration. With the rapid development of network technology, distributed denial of service (DDoS) attacks become one of the most important issues today. In this paper, we propose a DDoS ontology to provide a common terminology for describing the DDoS models consisting of the ...

Journal: :Journal of Network and Computer Applications 2007

2017
Luuk Hendriks Ricardo de Oliveira Schmidt Roland van Rijswijk-Deij Aiko Pras

Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelming online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used systems by attackers. This problem can be further aggravated in the near future by the increasing numb...

2015
Sidharth Sharma Sanjay Kumar Jena

Cloud Computing has evolved as a new paradigm in which users can use on-demand services, according to their needs. However, security concerns are primary obstacles to a wider adoption of clouds. Newly born concepts that clouds introduced, such as multitenancy, resource sharing and outsourcing, create new challenges for the security research. DDoS (Distributed Denial of service) attack is the bi...

2006
Udaya Kiran Tupakula Vijay Varadharajan

Today’s Internet is extremely vulnerable to Distributed Denial of service (DDoS) attacks. There is tremendous pressure on the sites performing online business and ISP’s to protect their networks from DDoS attacks. Recently, several novel traceback techniques have been proposed to trace the approximate spoofed source of attack. Each proposed traceback technique has some unique advantages and dis...

2004
Tao Peng

The Denial of Service attack, especially the Distributed Denial of Service (DDoS) attack, has become one of the major threats to the Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim’s services are disrupted when its host or network resources are occupied by the attack traffic. The threat of DDoS ...

Journal: :I. J. Network Security 2015
Hasmukh Patel Devesh C. Jinwala

The Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks are aimed at maliciously consuming the available resources in computing systems to prevent genuine users from legitimately accessing them. These attacks can easily interrupt or disable targeted systems, so it is important for the system to detect and filter bogus connection requests as early as possible. Many common pr...

2017
Bruno Rodrigues Thomas Bocek Burkhard Stiller

Distributed Denial-of-Service (DDoS) defense systems are not capable of withstanding by themselves against large-scale attacks. Thus, coordinated protection efforts have become an attractive alternative to extend defense capabilities of a single system. However, existing DDoS signaling protocols are a bottleneck to make a coordinated and distributed defense fully operational. Blockchain technol...

Journal: :CoRR 2016
Michele Nogueira Lima

Distributed Denial of Service (DDoS) is a classic type of Cybercrime and can still strongly damage company reputation and increase costs. Attackers have continuously improved their strategies, and the amount of unleashed communication requests has doubled in volume, size and frequency. This has occurred through different isolated hosts, leading them to resource exhaustion. Previous studies have...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید