Articles with "ddos attacks" as a keyword



Photo from wikipedia

Labeled flow-based dataset of ICMPv6-based DDoS attacks

Sign Up to like & get
recommendations!
Published in 2018 at "Neural Computing and Applications"

DOI: 10.1007/s00521-017-3319-7

Abstract: DDoS attacks that depend on Internet Control Message Protocol version 6 (ICMPv6) are one of the most commonly performed IPv6 attacks against today’s IPv6 networks. A few detection systems were proposed to detect these attacks… read more here.

Keywords: based ddos; ddos attacks; flow based; icmpv6 based ... See more keywords
Photo from wikipedia

SAD-IoT: Security Analysis of DDoS Attacks in IoT Networks

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Personal Communications"

DOI: 10.1007/s11277-021-08890-6

Abstract: Internet of Things is one of the most versatile technologies in existence today. It has taken over our day to day activities and thus has many applications that are designed to make life easier and… read more here.

Keywords: dos ddos; ddos; ddos attacks; sad iot ... See more keywords
Photo from wikipedia

A cognitive mechanism for mitigating DDoS attacks using the artificial immune system in a cloud environment

Sign Up to like & get
recommendations!
Published in 2021 at "Evolutionary Intelligence"

DOI: 10.1007/s12065-019-00340-4

Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks can largely damage the availability of the cloud services and can be effectively initiated by utilizing different tools, prompting financial harm or influencing the… read more here.

Keywords: ddos attacks; artificial immune; system; cognitive mechanism ... See more keywords
Photo from wikipedia

A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs

Sign Up to like & get
recommendations!
Published in 2022 at "Technological Forecasting and Social Change"

DOI: 10.1016/j.techfore.2022.121554

Abstract: The current COVID-19 issue has altered the way of doing business. Now that most customers prefer to do business online, many companies are shifting their business models, which attracts cyber attackers to launch several kinds… read more here.

Keywords: business; ddos attacks; covid scenario; approach ... See more keywords
Photo by rparmly from unsplash

SGS: Safe-Guard Scheme for Protecting Control Plane Against DDoS Attacks in Software-Defined Networking

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2895092

Abstract: Software-defined networking (SDN) achieves flexible and efficient network management by decoupling control plane from the data plane, where the controller with a global network view is responsible for planning routing for packets. However, the centralized… read more here.

Keywords: plane; controller; ddos attacks; control plane ... See more keywords
Photo from wikipedia

Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2915792

Abstract: Traditional Distributed Denial of Service (DDoS) attacks usually flood network targets with malicious traffic. Recently, new types of DDoS attacks have emerged and target specifically network security devices, mainly firewalls and intrusion prevention systems (IPS).… read more here.

Keywords: paper; firewalling attacks; attack; ddos attacks ... See more keywords
Photo from wikipedia

A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2922196

Abstract: Recently, software defined networks (SDNs) and cloud computing have been widely adopted by researchers and industry. However, widespread acceptance of these novel networking paradigms has been hampered by the security threats. Advances in the processing… read more here.

Keywords: ddos attacks; denial service; cloud computing; sdn cloud ... See more keywords
Photo from wikipedia

A New Smart Router-Throttling Method to Mitigate DDoS Attacks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2930803

Abstract: The distributed denial of service (DDoS) attack is one of the most server threats to the current Internet and brings huge losses to society. Furthermore, it is challenging to defend DDoS due to the case… read more here.

Keywords: router; throttling method; ddos attacks; new smart ... See more keywords
Photo by goian from unsplash

RTVD: A Real-Time Volumetric Detection Scheme for DDoS in the Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2974293

Abstract: Distributed Denial of Service (DDoS) attacks are increasingly harmful to the cyberspace nowadays. The attackers can now easily launch a bigger and more challenging DDoS attack both towards and with Internet-of-Things (IoT) devices, due to… read more here.

Keywords: time; real time; internet things; ddos attacks ... See more keywords
Photo by noaa from unsplash

A New Framework for DDoS Attack Detection and Defense in SDN Environment

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3021435

Abstract: While software defined network (SDN) brings more innovation to the development of future networks, it also faces a more severe threat from DDoS attacks. In order to deal with the single point of failure on… read more here.

Keywords: detection defense; ddos attacks; sdn environment; ddos attack ... See more keywords
Photo by anniespratt from unsplash

Scheduling of Scientific Workflows in Multi-Fog Environments Using Markov Models and a Hybrid Salp Swarm Algorithm

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3031472

Abstract: Security attacks are a nightmare to many computing environments such as fog computing, and these attacks should be addressed. Fog computing environments are vulnerable to various kinds of DDoS attacks, which can keep fog resources… read more here.

Keywords: salp swarm; swarm algorithm; fog computing; fog environments ... See more keywords