Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions
Cloud computing model provides on demand, elastic and fully managed computer system
resources and services to organizations. However, attacks on cloud components can cause …
resources and services to organizations. However, attacks on cloud components can cause …
ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …
address depletion, but also mandated the use of Internet Control Message Protocol version …
[PDF][PDF] An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment
Distributed denial-of-service (DDoS) is a rapidly growing problem with the fast development
of the Internet. There are multitude DDoS detection approaches, however, three major …
of the Internet. There are multitude DDoS detection approaches, however, three major …
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks
Distributed denial of service (DDoS) is an immense threat for Internet based-applications
and their resources. It immediately floods the victim system by transmitting a large number of …
and their resources. It immediately floods the victim system by transmitting a large number of …
Detecting network cyber-attacks using an integrated statistical approach
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and
safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical …
safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical …
IPv6 neighbor discovery protocol specifications, threats and countermeasures: a survey
ASAMS Ahmed, R Hassan, NE Othman - IEEE access, 2017 - ieeexplore.ieee.org
Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6)
suite. The motive behind NDP is to replace address resolution protocol (ARP), router …
suite. The motive behind NDP is to replace address resolution protocol (ARP), router …
[HTML][HTML] DDOS-attacks detection using an efficient measurement-based statistical mechanism
A monitoring mechanism is vital for detecting malicious attacks against cyber systems.
Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the most important …
Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the most important …
KS-DDoS: Kafka streams-based classification approach for DDoS attacks
A distributed denial of service (DDoS) attack is the most destructive threat for internet-based
systems and their resources. It stops the execution of victims by transferring large numbers …
systems and their resources. It stops the execution of victims by transferring large numbers …
[PDF][PDF] Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm.
AHB Aighuraibawi, S Manickam, R Abdullah… - Comput. Syst. Sci …, 2023 - researchgate.net
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4× 1038 unique
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …
Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …