Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …
Distributed denial of service attacks: a threat or challenge
J Kaur Chahal, A Bhandari, S Behal - New Review of Information …, 2019 - Taylor & Francis
In today's cyber world, the Internet has become a vital resource for providing a plethora of
services. Unavailability of these services due to any reason leads to huge financial …
services. Unavailability of these services due to any reason leads to huge financial …
Ensemble classifiers for network intrusion detection using a novel network attack dataset
Due to the extensive use of computer networks, new risks have arisen, and improving the
speed and accuracy of security mechanisms has become a critical need. Although new …
speed and accuracy of security mechanisms has become a critical need. Although new …
[图书][B] Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures
BB Gupta, A Dahiya - 2021 - taylorfrancis.com
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are
increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource …
increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource …
Predictive machine learning-based integrated approach for DDoS detection and prevention
Abstract Distributed Denial of Service attack has been a huge threat to the Internet and may
carry extreme losses to systems, companies, and national security. The invader can …
carry extreme losses to systems, companies, and national security. The invader can …
[HTML][HTML] Health IoT Threats: Survey of Risks and Vulnerabilities
The secure and efficient collection of patients' vital information is a challenge faced by the
healthcare industry. Through the adoption and application of Internet of Things (IoT), the …
healthcare industry. Through the adoption and application of Internet of Things (IoT), the …
Group key agreement protocol based on privacy protection and attribute authentication
Z Qikun, L Yongjiao, G Yong, Z Chuanyang… - IEEE …, 2019 - ieeexplore.ieee.org
Group key agreement is a good way to ensure secure communication within a group.
However, the identity authentication, privacy protection, and information sharing access …
However, the identity authentication, privacy protection, and information sharing access …
A comprehensive survey on DDoS attacks and recent defense mechanisms
BB Gupta, A Dahiya, C Upneja, A Garg… - … of Research on …, 2020 - igi-global.com
DDoS attack always takes advantage of structure of Internet and imbalance of resources
between defender and attacker. DDoS attacks are driven by factors like interdependency of …
between defender and attacker. DDoS attacks are driven by factors like interdependency of …
Exploratory study on kali NetHunter lite: a digital forensics approach
M Stanković, U Karabiyik - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
Mobile devices, specifically smartphones, have become a necessity in everyday life, as we
perform many essential day-to-day tasks using these devices. With the projected increase in …
perform many essential day-to-day tasks using these devices. With the projected increase in …
[PDF][PDF] Implementation of DoS and DDoS attacks on cloud servers
S Mahjabin - Periodicals of Engineering and Natural Sciences (PEN), 2018 - core.ac.uk
Cloud environments face many threats as traditional corporate networks, but due to the vast
amount of data stored on cloud servers, providers become an attractive target. Thus the …
amount of data stored on cloud servers, providers become an attractive target. Thus the …