نتایج جستجو برای: ddos attacks

تعداد نتایج: 57960  

Journal: :CoRR 2012
Esraa Alomari Selvakumar Manickam B. B. Gupta Shankar Karuppayah Rafeef Alfaris

Botnets are prevailing mechanisms for the facilitation of the distributed denial of service (DDoS) attacks on computer networks or applications. Currently, Botnet-based DDoS attacks on the application layer are latest and most problematic trends in network security threats. Botnet-based DDoS attacks on the application layer limits resources, curtails revenue, and yields customer dissatisfaction...

2004
Stephen M. Specht Ruby B. Lee

Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against primary victim systems. As new countermeasures are developed to prevent or mitigate DDoS attacks, attackers are constantly developing new methods to circumvent ...

2012
Armin Büscher Thorsten Holz

Known for a long time, Distributed Denial-of-Service (DDoS) attacks are still prevalent today and cause harm on the Internet on a daily basis. The main mechanism behind this kind of attacks is the use of so called botnets, i.e., networks of compromised machines under the control of an attacker. There are several different botnet families that focus on DDoS attacks and are even used to sell such...

Journal: :journal of advances in computer engineering and technology 2015
bita amirshahi ali ahangari

abstract—today, botnets have become a serious threat to enterprise networks. by creation of network of bots, they launch several attacks, distributed denial of service attacks (ddos) on networks is a sample of such attacks. such attacks with the occupation of system resources, have proven to be an effective method of denying network services. botnets that launch http packet flood attacks agains...

Journal: :Future Generation Comp. Syst. 2014
Wei Zhou Weijia Jia Sheng Wen Yang Xiang Wanlei Zhou

Web servers are usually located in a well-organized data center where these servers connect with the outside Internet directly through backbones. Meanwhile, the application-layer distributed denials of service (AL-DDoS) attacks are critical threats to the Internet, particularly to those business web servers. Currently, there are somemethods designed to handle the AL-DDoS attacks, but most of th...

2008
Hyundo Park Peng Li Debin Gao Heejo Lee Robert H. Deng

Threads posed by Distributed Denial of Service (DDoS) attacks are becoming more serious day by day. Accurately detecting DDoS becomes an important and necessary step in securing a computer network. However, Flash Event (FE), which is created by legitimate requests, shares very similar characteristics with DDoS in many aspects and makes it hard to be distinguished from DDoS attacks. In this pape...

Journal: :IJISP 2014
M. Poongodi Sundan Bose

Distributed Denial of Service (DDOS) attacks are the major concern for security in the collaborative networks. Although non DDOS attacks are also make the network performances poor, the effect of DDOS attacks is severe. In DDOS attacks, flooding of the particular node as victim and jam it with massive traffic happens and the complete network performance is affected. In this paper, a novel Intru...

2014
B. Padmavathi

DDoS attacks temporarily make the target system unavailable to the legitimate users. They don’t steal anything. But they cause big headache for targeted companies and network engineers. Application layer DDoS attacks are difficult to detect because they mimic normal traffic. This paper proposes a novel method of detection of DDoS attacks based on Chaos theory and Artificial neural networks. Key...

2008
Jalal Ale Ahmad

-A Distributed denial of service (DDoS) attack uses multiple machines operating in concern to attack a network or site. It is the most important security problem for IT managers. These attacks are very simple organized for intruders and hence so disruptive. The detection and defense of this attack has specific importance among network specialists. In this paper a new and smart taxonomy of DDoS ...

2013
Shweta Tripathi Brij Gupta Ammar Almomani Anupama Mishra Suresh Veluru

Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of flooding the victim network with an enormous number of packets, hence exhausting the resources and preventing the legitimate users to access them. After having standard DDoS defens...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید