Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

Distributed denial of service attacks: a threat or challenge

J Kaur Chahal, A Bhandari, S Behal - New Review of Information …, 2019 - Taylor & Francis
In today's cyber world, the Internet has become a vital resource for providing a plethora of
services. Unavailability of these services due to any reason leads to huge financial …

Ensemble classifiers for network intrusion detection using a novel network attack dataset

A Mahfouz, A Abuhussein, D Venugopal, S Shiva - Future Internet, 2020 - mdpi.com
Due to the extensive use of computer networks, new risks have arisen, and improving the
speed and accuracy of security mechanisms has become a critical need. Although new …

[图书][B] Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures

BB Gupta, A Dahiya - 2021 - taylorfrancis.com
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are
increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource …

Predictive machine learning-based integrated approach for DDoS detection and prevention

SD Kebede, B Tiwari, V Tiwari… - Multimedia Tools and …, 2022 - Springer
Abstract Distributed Denial of Service attack has been a huge threat to the Internet and may
carry extreme losses to systems, companies, and national security. The invader can …

[HTML][HTML] Health IoT Threats: Survey of Risks and Vulnerabilities

S Madanian, T Chinbat, M Subasinghage, D Airehrour… - Future Internet, 2024 - mdpi.com
The secure and efficient collection of patients' vital information is a challenge faced by the
healthcare industry. Through the adoption and application of Internet of Things (IoT), the …

Group key agreement protocol based on privacy protection and attribute authentication

Z Qikun, L Yongjiao, G Yong, Z Chuanyang… - IEEE …, 2019 - ieeexplore.ieee.org
Group key agreement is a good way to ensure secure communication within a group.
However, the identity authentication, privacy protection, and information sharing access …

A comprehensive survey on DDoS attacks and recent defense mechanisms

BB Gupta, A Dahiya, C Upneja, A Garg… - … of Research on …, 2020 - igi-global.com
DDoS attack always takes advantage of structure of Internet and imbalance of resources
between defender and attacker. DDoS attacks are driven by factors like interdependency of …

Exploratory study on kali NetHunter lite: a digital forensics approach

M Stanković, U Karabiyik - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
Mobile devices, specifically smartphones, have become a necessity in everyday life, as we
perform many essential day-to-day tasks using these devices. With the projected increase in …

[PDF][PDF] Implementation of DoS and DDoS attacks on cloud servers

S Mahjabin - Periodicals of Engineering and Natural Sciences (PEN), 2018 - core.ac.uk
Cloud environments face many threats as traditional corporate networks, but due to the vast
amount of data stored on cloud servers, providers become an attractive target. Thus the …