Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Neural Computing and Applications"
DOI: 10.1007/s00521-017-3319-7
Abstract: DDoS attacks that depend on Internet Control Message Protocol version 6 (ICMPv6) are one of the most commonly performed IPv6 attacks against today’s IPv6 networks. A few detection systems were proposed to detect these attacks…
read more here.
Keywords:
based ddos;
ddos attacks;
flow based;
icmpv6 based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Wireless Personal Communications"
DOI: 10.1007/s11277-021-08890-6
Abstract: Internet of Things is one of the most versatile technologies in existence today. It has taken over our day to day activities and thus has many applications that are designed to make life easier and…
read more here.
Keywords:
dos ddos;
ddos;
ddos attacks;
sad iot ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Evolutionary Intelligence"
DOI: 10.1007/s12065-019-00340-4
Abstract: Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks can largely damage the availability of the cloud services and can be effectively initiated by utilizing different tools, prompting financial harm or influencing the…
read more here.
Keywords:
ddos attacks;
artificial immune;
system;
cognitive mechanism ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
3
Published in 2022 at "Technological Forecasting and Social Change"
DOI: 10.1016/j.techfore.2022.121554
Abstract: The current COVID-19 issue has altered the way of doing business. Now that most customers prefer to do business online, many companies are shifting their business models, which attracts cyber attackers to launch several kinds…
read more here.
Keywords:
business;
ddos attacks;
covid scenario;
approach ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2895092
Abstract: Software-defined networking (SDN) achieves flexible and efficient network management by decoupling control plane from the data plane, where the controller with a global network view is responsible for planning routing for packets. However, the centralized…
read more here.
Keywords:
plane;
controller;
ddos attacks;
control plane ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2915792
Abstract: Traditional Distributed Denial of Service (DDoS) attacks usually flood network targets with malicious traffic. Recently, new types of DDoS attacks have emerged and target specifically network security devices, mainly firewalls and intrusion prevention systems (IPS).…
read more here.
Keywords:
paper;
firewalling attacks;
attack;
ddos attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2922196
Abstract: Recently, software defined networks (SDNs) and cloud computing have been widely adopted by researchers and industry. However, widespread acceptance of these novel networking paradigms has been hampered by the security threats. Advances in the processing…
read more here.
Keywords:
ddos attacks;
denial service;
cloud computing;
sdn cloud ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2930803
Abstract: The distributed denial of service (DDoS) attack is one of the most server threats to the current Internet and brings huge losses to society. Furthermore, it is challenging to defend DDoS due to the case…
read more here.
Keywords:
router;
throttling method;
ddos attacks;
new smart ... See more keywords
Photo by goian from unsplash
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2974293
Abstract: Distributed Denial of Service (DDoS) attacks are increasingly harmful to the cyberspace nowadays. The attackers can now easily launch a bigger and more challenging DDoS attack both towards and with Internet-of-Things (IoT) devices, due to…
read more here.
Keywords:
time;
real time;
internet things;
ddos attacks ... See more keywords
Photo by noaa from unsplash
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3021435
Abstract: While software defined network (SDN) brings more innovation to the development of future networks, it also faces a more severe threat from DDoS attacks. In order to deal with the single point of failure on…
read more here.
Keywords:
detection defense;
ddos attacks;
sdn environment;
ddos attack ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3031472
Abstract: Security attacks are a nightmare to many computing environments such as fog computing, and these attacks should be addressed. Fog computing environments are vulnerable to various kinds of DDoS attacks, which can keep fog resources…
read more here.
Keywords:
salp swarm;
swarm algorithm;
fog computing;
fog environments ... See more keywords