Articles with "distributed denial" as a keyword



Photo from wikipedia

Intrusion detection of distributed denial of service attack in cloud

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1149-0

Abstract: Security issue in cloud environment is one of the major obstacle in cloud implementation. Network attacks make use of the vulnerability in the network and the protocol to damage the data and application. Cloud follows… read more here.

Keywords: network; denial service; cloud; intrusion detection ... See more keywords
Photo by chaozzy from unsplash

CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacks

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-02556-0

Abstract: In the reliability and security challenges for the Internet of Things (IoT) systems, managing unpredictable events and controlling the abnormal situation automatically are provisioned by the integration of self-healing properties. Despite this, in our knowledge,… read more here.

Keywords: protocol cloudiot; cloudiot available; distributed denial; protocol ... See more keywords
Photo from wikipedia

Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller–A Review

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3013998

Abstract: The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined Networking (SDN) is a new networking architecture that isolates the network control plane from… read more here.

Keywords: software defined; defined networking; detection techniques; controller ... See more keywords
Photo by dulhiier from unsplash

DeepSecure: Detection of Distributed Denial of Service Attacks on 5G Network Slicing—Deep Learning Approach

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2021.3133479

Abstract: Network slicing is one of the main enablers of the fifth-generation (5G) cellular network. However, it is susceptible to security threats such as distributed denial of service (DDoS) attacks. A DDoS attack on a slice… read more here.

Keywords: network; network slicing; distributed denial; deep learning ... See more keywords
Photo from wikipedia

Distributed Denial of Service (DDoS): A History

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Annals of the History of Computing"

DOI: 10.1109/mahc.2021.3072582

Abstract: Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early… read more here.

Keywords: distributed denial; history; denial service; service ddos ... See more keywords
Photo from wikipedia

Forging a deep learning neural network intrusion detection framework to curb the distributed denial of service attack

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Electrical and Computer Engineering"

DOI: 10.11591/ijece.v11i2.pp1498-1509

Abstract: Today’s popularity of the internet has since proven an effective and efficient means of information sharing. However, this has consequently advanced the proliferation of adversaries who aim at unauthorized access to information being shared over… read more here.

Keywords: neural network; distributed denial; denial service; deep learning ... See more keywords
Photo from wikipedia

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/1550147717741463

Abstract: Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article,… read more here.

Keywords: attack; denial service; distributed denial; mitigation techniques ... See more keywords
Photo by cokdewisnu from unsplash

Quantum Computing and Machine Learning for Cybersecurity: Distributed Denial of Service (DDoS) Attack Detection on Smart Micro-Grid

Sign Up to like & get
recommendations!
Published in 2023 at "Energies"

DOI: 10.3390/en16083572

Abstract: Machine learning (ML) is efficiently disrupting and modernizing cities in terms of service quality for mobility, security, robotics, healthcare, electricity, finance, etc. Despite their undeniable success, ML algorithms need crucial computational efforts with high-speed computing… read more here.

Keywords: machine; ddos; machine learning; distributed denial ... See more keywords