نتایج جستجو برای: ddos attack

تعداد نتایج: 81369  

Journal: :I. J. Network Security 2012
B. B. Gupta Ramesh Chandra Joshi Manoj Misra

A real time estimation of the number of zombies in DDoS attack scenario is helpful to suppress the effect of attack by choosing predicted number of most suspicious attack sources for either filtering or rate limiting. In this paper, ANN is employed to estimate number of zombies involved in a DDoS attack. The method does not depend on the frequency of attack and hence solves the problem of low d...

2007
Mihui Kim Jaewon Seo Kijoon Chae

The distributed denial of service (DDoS) attack that is one of the most threatening attacks in the wired network has been already extended in the wireless mobile network, owing to the appearance of DDoS attack tool against mobile phone. In the future, the latent threats for the converged form of DDoS attack should be resolved for the induction of successful convergence network. However, because...

2016
S. Fouzul Hidhaya

144 Abstract—With significant growth in Internet, many day-to-day life activities such as shopping, banking transactions, commerce and Learning, etc. are simplified and made possible with the help of web applications. To protect the user’s confidential information, many security mechanisms are developed using machine learning algorithms. For the past ten years, Application Layer DDoS attack is ...

2001
Dong Xuan Shengquan Wang Ye Zhu Riccardo Bettati Wei Zhao

We describe a defense system to contain Distributed Denial-of-Service (DDoS) flooding attacks in highspeed networks. We aim at protecting TCP friendly traffic, which forms a large portion of Internet traffic. DDoS flooding attacks tend to establish large numbers of malicious traffic flows to congest network. These flows are marked as TCP flows, and use spoofed source identifiers to hide their i...

2016
Saket Acharya Namita Tiwari

Distributed denial-of-service (DDoS) attacks are one of the key threats and perhaps the toughest security problem for today’s Internet.Distributed Denial of Service (DDoS) attack has become a stimulating problem to the availability of resources in computer networks.With brief or no advance warning, a DDoS attack can easily drain the computing and communication resources of its victim within a s...

Journal: :Informatica (Slovenia) 2010
Zhengmin Xia Songnian Lu Jianhua Li Junhua Tang

Distributed denial-of-service (DDoS) flood attack remains great threats to the Internet. This kind of attack consumes a large amount of network bandwidth or occupies network equipment resources by flooding them with packets from the machines distributed all over the world. To ensure the network usability and reliability, real-time and accurate detection of these attacks is critical. To date, va...

Journal: :JNW 2015
Muhammad Morshed Alam Muhammad Yeasir Arafat Feroz Ahmed

Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bo...

2007
Vrizlynn L. L. Thing Morris Sloman Naranker Dulay

In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting in attack tools becoming more powerful. Developing new techniques for detecting and responding to the latest DDoS attacks often entails using attack traces to determine attack signatures and to test the techniques. However, obta...

2013
Abubakar Bala Yahya Osais

At the beginning of the 21st century, a new form of denial of service (DoS) attack emerged which is the Distributed DoS (DDoS). This new form of attack was launched on huge number of prominent websites such as yahoo, e-bay, Amazon, and buy.com, resulting in tremendous financial loses. DDoS attack has continued to increase over the years due to the rapid increase in internet users. Moreover, eve...

2014
V. Sharmila Mr. K. MuthuRamalingam

one of the most complicated attacks in wireless sensor network is energy depletion attack. In which vampire attack and Distributed Denial of Service (DDOS) attack were leading. In this paper using a newly proposed Enhanced Ad Hoc on-Demand Vector (ENAODV) routing protocol, the link break at distant node is repaired with alternate path selection of shortest route in secure manner. The Adaptive T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید