نتایج جستجو برای: ddos detection

تعداد نتایج: 567162  

2002
Noureldien A. Noureldien

Recently many prominent web sites face a new type of denial of service attack known as Distributed Denial of Service attack (DDoS). Organizations deploying security measures such as firewalls, and intrusion detection systems could face the traditional DoS attack. Yet there is no complete solution neither for protection from DDoS attack, nor for preserving network hosts from participating in suc...

Journal: :Korean Journal of Applied Statistics 2013

2017
Abdullah Aljumah

Distributed Denial of Services (DDoS) is a ruthless attack that targets a node or a medium with its false packets to decline the network performance and its resources. Neural networks is a powerful tool to defend a network from this attack as in our proposed solution a mitigation process is invoked when an attack is detected by the detection system using the known patters which separate the leg...

2014
Daniel Romão Niels van Dijkhuizen

Distributed Denial of Service attacks are becoming very popular nowadays. The easy access to services and resources that can be used for this purpose, and the high resulting amount of damage, are the main reasons for this. Current detection and mitigation systems are not accurate enough and can be very expensive. Previous research has led to detection methods that even though can be accurate fo...

Journal: :I. J. Network Security 2016
Arindom Ain Monowar H. Bhuyan Dhruba Kumar Bhattacharyya Jugal K. Kalita

A low-rate distributed denial of service (DDoS) attack has the ability to obscure its tra c because it is very similar to legitimate tra c. It can easily evade current detection mechanisms. Rank correlation measures can quantify significant di↵erences between attack tra c and legitimate traffic based on their rank values. In this paper, we use two rank correlation measures, namely, Spearmen Ran...

2011
Rizwan Khan A. K. Vatsa

MANET is quickly spreading for the property of its capability in forming rapidly changing topologies network without the aid of any established infrastructure or centralized administration. The security challenges in MANET have become a primary concern to provide secure communication. The Attacks on MANET disrupts network performance and reliability. The DOS (denial-of-service), Distributed den...

2016
A. Manimaran M. Durairaj

A major threat to cloud infrastructure network is distributed denial of service (DDoS) attacks. It makes the resources unavailable for its anticipated users, which can be accomplished through malicious virtual machines (VMs) in a hypervisor layer of cloud datacenter. Less protection in VMs leads to DDoS attacks on cloud environment. Traditional approaches used data flow based method, but that i...

2007
Mihui Kim Jaewon Seo Kijoon Chae

The distributed denial of service (DDoS) attack that is one of the most threatening attacks in the wired network has been already extended in the wireless mobile network, owing to the appearance of DDoS attack tool against mobile phone. In the future, the latent threats for the converged form of DDoS attack should be resolved for the induction of successful convergence network. However, because...

2014
Rama Mohan Reddy K. Munivara Prasad

Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks are typically explicit attempts to exhaust victim’s bandwidth or disrupt legitimate users’ access to services. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to gain access to a large number of compromised computers by exploiting their vulnerabilities to set ...

2015
An Wang Aziz Mohaisen Wentao Chang Songqing Chen

Despite continuous defense efforts, DDoS attacks are still very prevalent on the Internet. In such arms races, attackers are becoming more agile and their strategies are more sophisticated to escape from detection. Effective defenses demand in-depth understanding of such strategies. In this paper, we set to investigate the DDoS landscape from the perspective of the attackers. We focus on the dy...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید