Identification of distributed denial of services anomalies by using combination of entropy and sequential probabilities ratio test methods

BH Ali, N Sulaiman, SAR Al-Haddad, R Atan… - Sensors, 2021 - mdpi.com
One of the most dangerous kinds of attacks affecting computers is a distributed denial of
services (DDoS) attack. The main goal of this attack is to bring the targeted machine down …

Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat

N Gavrić, Ž Bojović - Sensors, 2022 - mdpi.com
The application layer in the Internet protocol suite offers a significant degree of freedom
regarding the orchestration of distributed denial-of-service attacks due to many different and …

Hybrid system between anomaly based detection system and honeypot to detect zero day attack

N Innab, E Alomairy, L Alsheddi - 2018 21st Saudi Computer …, 2018 - ieeexplore.ieee.org
Honeypots are systems designed to lure the potential attacker to a real system by make him
busy with emulated system. Its primary objective is gathering information about the attacker …

[PDF][PDF] Protection of personally identifiable Information and Privacy via the use of Hardware and Software

M Kangwa, CS Lubobya, J Phiri - Lecture Notes in Engineering and …, 2021 - iaeng.org
This paper proposes a novel approach to enhance the protection of Personally Identifiable
Information (PII) using a unique combination of hardware and software as well as the use of …

Intrusion Detection System Mechanisms in Cloud Computing: Techniques and Opportunities

N Innab, I Atoum, F Alghayadh… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Cloud computing has become a vital part of many organizations due to its ability to provide a
resilient IT infrastructure over the internet without being the owner of such infrastructure …

[PDF][PDF] Enhanced Protection of Ecommerce Users' Personal Data and Privacy using the Trusted Third Party Model.

M Kangwa, CS Lubobya, J Phiri - ICE-B, 2021 - scitepress.org
The rapid adoption of electronic delivery of services by various electronic service providers
such as ecommerce and e-governance services leaves the users of these services with no …

Cost-Effective DDoS Mitigation: Leveraging Nginx Reverse Proxy for Enhanced Server Protection

VBA Pardosi - Jurnal Teknologi Informasi dan Pendidikan, 2024 - tip.ppj.unp.ac.id
The problem addressed in this research is the vulnerability of servers to Distributed Denial of
Service (DDoS) attacks, which lead to disruptions, financial losses, and the loss of user trust …

[PDF][PDF] Modelling the impact of cyber-attacks on web based sales

E Gelenbe, Y Wang - Submitted for Publication, 2019 - researchgate.net
Performance Modelling to predict the quality of service (QoS) of computer systems and
networks is widely applied. Similarly there is an abundant literature on the analysis and …

Factors Effecting Businesses due to Distributed Denial of Service (DDoS) Attack

H Mateen, M Shahzad - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) Attack is often referred as Distributed Network attack.
The impact of an effective DDoS attack depends on the targeted company and the business …

Application and Analysis of Machine Learning and Deep Learning Algorithms in Detection of DDoS Cyberattacks

D Deb - 2024 - search.proquest.com
Abstract A Distributed Denial-of-Service (DDoS) attack involves overwhelming a target
system's data bandwidth or computational resources, often using multiple attack systems …