Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects

A Ghosh, S Gupta, A Dua, N Kumar - Journal of Network and Computer …, 2020 - Elsevier
In contemporary era of technologies, blockchain has acquired tremendous attention from
various domains. It has wide spectrum of applications ranging from finance to social services …

Security data collection and data analytics in the internet: A survey

X Jing, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm

Y Gu, K Li, Z Guo, Y Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attack is an attempt to make an online service
unavailable by overwhelming it with traffic from multiple sources. Therefore, it is necessary to …

Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions

A Bhardwaj, V Mangat, R Vig, S Halder… - Computer Science Review, 2021 - Elsevier
Cloud computing model provides on demand, elastic and fully managed computer system
resources and services to organizations. However, attacks on cloud components can cause …

An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm based approach

S Sokkalingam, R Ramakrishnan - … and Computation: Practice …, 2022 - Wiley Online Library
Cloud computing offers comfortable service to business sectors as they can concentrate on
their products. Over the internet, cloud computing is liable to various security threats and …

DDoS detection and prevention based on artificial intelligence techniques

B Zhang, T Zhang, Z Yu - 2017 3rd IEEE International …, 2017 - ieeexplore.ieee.org
DDoS attacks have been the major threats for the Internet and can bring great loss to
companies and governments. With the development of emerging technologies, such as …

[PDF][PDF] Distributed reflection denial of service attack: A critical review

RR Nuiaa, S Manickam… - International Journal of …, 2021 - researchgate.net
As the world becomes increasingly connected and the number of users grows exponentially
and “things” go online, the prospect of cyberspace becoming a significant target for …

The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet core

M Nawrocki, M Jonker, TC Schmidt… - Proceedings of the 21st …, 2021 - dl.acm.org
In this paper, we shed new light on the DNS amplification ecosystem, by studying
complementary data sources, bolstered by orthogonal methodologies. First, we introduce a …

[PDF][PDF] Leveraging prefix structure to detect volumetric ddos attack signatures with programmable switches

C Misa, R Durairajan, R Rejaie… - Proceedings of the IEEE …, 2024 - ix.cs.uoregon.edu
Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with Programmable
Switches Page 1 Leveraging Prefix Structure to Detect Volumetric DDoS Attack Signatures with …

A review of amplification-based distributed denial of service attacks and their mitigation

S Ismail, HR Hassen, M Just, H Zantout - Computers & Security, 2021 - Elsevier
Abstract The rise of Distributed Denial of Service (DDoS) attacks have been steady in terms
of the frequency and the impact of the attack. Traditionally, the attackers required control of a …