Articles with "ddos attack" as a keyword



Photo from wikipedia

An Efficient SDN-Based DDoS Attack Detection and Rapid Response Platform in Vehicular Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2854567

Abstract: With the prosperity of wireless networks, vehicular networks (VNs) have been extensively studied in recent years. It is deployed to ensure road safety, enhance the driving experience, and reduce traffic congestion. However, VNs are vulnerable… read more here.

Keywords: flow table; vehicular networks; attack detection; platform ... See more keywords
Photo from wikipedia

Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2896783

Abstract: Software-defined networking (SDN) is the key outcome of extensive research efforts over the past few decades toward transforming the Internet infrastructure to be more programmable, configurable, and manageable. However, critical cyber-threats in the SDN-based cloud… read more here.

Keywords: based cloud; ddos attack; sdn based; service ... See more keywords
Photo by noaa from unsplash

A New Framework for DDoS Attack Detection and Defense in SDN Environment

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3021435

Abstract: While software defined network (SDN) brings more innovation to the development of future networks, it also faces a more severe threat from DDoS attacks. In order to deal with the single point of failure on… read more here.

Keywords: detection defense; ddos attacks; sdn environment; ddos attack ... See more keywords
Photo by henrylim from unsplash

Application layer DDoS attack detection using Cuckoo Search algorithm-trained Radial Basis Function

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3182818

Abstract: In an application-layer distributed denial of service (App-DDoS) attack, zombie computers bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot identify these requests since they have legal forms of standard TCP… read more here.

Keywords: layer; cuckoo search; application layer; app ddos ... See more keywords
Photo by helloimnik from unsplash

A Software Defined Networking Architecture for DDoS-Attack in the Storage of Multimicrogrids

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3197283

Abstract: Multi-microgrid systems can improve the resiliency and reliability of the power system network. Secure communication for multi-microgrid operation is a crucial issue that needs to be investigated. This paper proposes a multi-controller software defined networking… read more here.

Keywords: attack storage; software defined; defined networking; architecture ... See more keywords
Photo from wikipedia

Optimization of RBF-SVM Kernel Using Grid Search Algorithm for DDoS Attack Detection in SDN-Based VANET

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3199712

Abstract: The dynamic nature of the vehicular space exposes it to distributed malicious attacks irrespective of the integration of enabling technologies. The software-defined network (SDN) represents one of these enabling technologies, providing an integrated improvement over… read more here.

Keywords: sdn; sdn based; detection; grid search ... See more keywords
Photo from wikipedia

SDN-Assisted Slow HTTP DDoS Attack Defense Method

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2017.2766636

Abstract: A Slow HTTP distributed denial of service (DDoS) attack causes a Web server to be unavailable, but it is difficult to detect in a network, because its traffic patterns are similar to those of legitimate… read more here.

Keywords: slow http; http ddos; ddos attack; http ... See more keywords
Photo by thisisengineering from unsplash

A variable-trust threshold-based approach for DDOS attack mitigation in software defined networks

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0273681

Abstract: Software-defined networks offer a new approach that attracts the attention of most academic and industrial circles due to the features it contains. However, some loopholes make such modern networks vulnerable to many types of attacks.… read more here.

Keywords: software defined; defined networks; trust; attack ... See more keywords
Photo by hajjidirir from unsplash

Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron

Sign Up to like & get
recommendations!
Published in 2023 at "Future Internet"

DOI: 10.3390/fi15020076

Abstract: Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attacks… read more here.

Keywords: ddos; layer; deep learning; ddos attacks ... See more keywords
Photo by kellysikkema from unsplash

Overcoming the DDoS Attack Vulnerability of an ISO 19847 Shipboard Data Server

Sign Up to like & get
recommendations!
Published in 2023 at "Journal of Marine Science and Engineering"

DOI: 10.3390/jmse11051000

Abstract: The maritime industry, which transports approximately 90% of the world’s goods, plays a crucial role in the global economy. However, increasing reliance on digital technologies has made the industry vulnerable to cybersecurity threats that may… read more here.

Keywords: vulnerability iso; iso 19847; ddos attack; shipboard data ... See more keywords
Photo by bermixstudio from unsplash

Detection of Unknown DDoS Attack Using Convolutional Neural Networks Featuring Geometrical Metric

Sign Up to like & get
recommendations!
Published in 2023 at "Mathematics"

DOI: 10.3390/math11092145

Abstract: DDoS attacks remain a persistent cybersecurity threat, blocking services to legitimate users and causing significant damage to reputation, finances, and potential customers. For the detection of DDoS attacks, machine learning techniques such as supervised learning… read more here.

Keywords: ddos; convolutional neural; detection; featuring geometrical ... See more keywords