نتایج جستجو برای: ddos

تعداد نتایج: 2088  

Journal: :Annales des Télécommunications 2017
Gaurav Somani Manoj Singh Gaur Dheeraj Sanghi Mauro Conti Rajkumar Buyya

Current trends in distributed denial of service (DDoS) attacks show variations in terms of attack motivation, planning, infrastructure, and scale. “DDoS-for-Hire” and “DDoS mitigation as a Service” are the two services, which are available to attackers and victims, respectively. In this work, we provide a fundamental difference between a “regular” DDoS attack and an “extreme” DDoS attack. We co...

Journal: :CoRR 2010
Debajyoti Mukhopadhyay Byung-Jun Oh Sang-Heon Shim Young-Chon Kim

In this paper, we present a study on the recent approaches in handling Distributed Denial of Service (DDoS) attacks. DDoS attack is a fairly new type of attack to cripple the availability of Internet services and resources. A DDos attack can originate from anywhere in the network and typically overwhelms the victim server by sending a huge number of packets. Several remedial measures have been ...

2014
B. Padmavathi

DDoS attacks temporarily make the target system unavailable to the legitimate users. They don’t steal anything. But they cause big headache for targeted companies and network engineers. Application layer DDoS attacks are difficult to detect because they mimic normal traffic. This paper proposes a novel method of detection of DDoS attacks based on Chaos theory and Artificial neural networks. Key...

Journal: :International Journal of Computer Applications 2017

Journal: :I. J. Network Security 2017
Sunny Behal Krishan Kumar

Distributed Denial of Service (DDoS) attack imposes a severe threat to the extensively used Internet based services like e-commerce, e-banking, transportation, medicine, education etc. Hackers compromises the vulnerable systems for launching DDoS attacks in order to degrade or sometimes completely disrupt such services. In recent years, DDoS attacks have been increased in frequency, sophisticat...

2010
Monika Sachdeva Gurvinder Singh Krishan Kumar Kuldip Singh

Distributed Denial of Service Attacks imposes a major threat to the availability of Internet services. Most of the applications like banking, trade, and e-commerce are dependent on availability of Internet. Defending Internet from these attacks has become the need of the hour. A typical DDoS defense comprises of three modules namely traffic monitoring, traffic analysis and traffic filtering. Ba...

Journal: :Computer Networks 2007
Kejie Lu Dapeng Wu Jieyan Fan Sinisa Todorovic Antonio Nucci

In recent years, distributed denial of service (DDoS) attacks have become a major security threat to Internet services. How to detect and defend against DDoS attacks is currently a hot topic in both industry and academia. In this paper, we propose a novel framework to robustly and efficiently detect DDoS attacks and identify attack packets. The key idea of our framework is to exploit spatial an...

2015
Sandeep Shinde

Mobile ad-hoc network is integration of node which is scatterd around the network. Every node in mobile ad-hoc netowk is configured by own, it also decentralized and less secure. Due to mobability properties of mobile ad-hoc network every node in mobile network move around the network. The DDOS attack is the major security in the mobile ad-hoc network. The DDOS attack it generate huge unwanted ...

2016
Karthikeyan Thyagarajan Arunkumar Thangavelu

Distributed Denial-of-Service (DDoS) attacks are a variant of Denial-of-Service (DoS) attacks where an attacker or a group of attackers employ multiple machines to carry out a DoS attack simultaneously, therefore increasing its effectiveness and strength. DDoS attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with...

Journal: :IEEE Trans. Computers 2003
Jun Xu Wooyong Lee

The recent tide of Distributed Denial of Service (DDoS) attacks against high-profile web sites demonstrate how devastating DDoS attacks are and how defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect the availability of web services during severe DDoS attacks. The basic idea behind our system is to isolate and protect legitimate traffic fro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید