Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms
Abstract Distributed Denial of Service (DDoS) attacks are still among the most dangerous
attacks on the Internet. With the advance of methods for detecting and mitigating these …
attacks on the Internet. With the advance of methods for detecting and mitigating these …
Adaptive contextual risk-based model to tackle confidentiality-based attacks in fog-IoT paradigm
S Selvan, M Mahinderjit Singh - Computers, 2022 - mdpi.com
The Internet of Things (IoT) allows billions of physical objects to be connected to gather and
exchange information to offer numerous applications. It has unsupported features such as …
exchange information to offer numerous applications. It has unsupported features such as …
Key Observation to Prevent IP Spoofing in DDoS Attack on Cloud Environment
T Sunitha, V Vijayashanthi… - … : Proceedings of SoCTA …, 2023 - Springer
The utilization of Cloud to put together and execute Distributed Denial of Service (DDoS)
assaults is well-known among programmers in the current scenario. In the existing …
assaults is well-known among programmers in the current scenario. In the existing …
A Scrutiny of Privacy and Security Issues in Fog Computing Environment
R Alexander, KPM Kumar - 2022 3rd International Conference …, 2022 - ieeexplore.ieee.org
The current technological improvements of IoT devices result in a significant volume of data
being generated. Traditional cloud-based systems store all data in a geographically …
being generated. Traditional cloud-based systems store all data in a geographically …
Preventing DRDoS attacks in 5G networks: a new source IP address validation approach
X Chen, W Feng, Y Ma, N Ge… - GLOBECOM 2020-2020 …, 2020 - ieeexplore.ieee.org
Distributed Reflection Denial of Service (DRDoS) attack has become one of the most serious
threats to Internet security. With the ongoing development of 5G, a massive number of …
threats to Internet security. With the ongoing development of 5G, a massive number of …
A Hybrid Approach to Protect Server from IP Spoofing Attack
V Parekh, M Saravanan - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
The rapid expansion of the internet has resulted in distributed denial of service cyberattacks
being one of the most critical problems in a data centre environment where numerous …
being one of the most critical problems in a data centre environment where numerous …
Effective Security Mechanisms against Distributed Denial of Services
K Gaur, K Gaur, T Sachdeva, M Diwakar… - 2023 6th …, 2023 - ieeexplore.ieee.org
In general, the popularity of DDoS attacks being used as a weapon to harm the opposite
party, is on the rise. Hence, is the need for the security from such disruptive attacks. There …
party, is on the rise. Hence, is the need for the security from such disruptive attacks. There …
A Hybrid Ensemble Machine Learning Approach (EHML) for DDOS Attack Detection in Smart City Network Traffic
The Internet has had a profound effect on society over the last couple of decades. However,
various cyberattacks, such as ransomware attacks, phishing attacks, DOS/DDOS attacks …
various cyberattacks, such as ransomware attacks, phishing attacks, DOS/DDOS attacks …
[PDF][PDF] IP Spoofing Detection for Preventing DDoS Attack in Grid Computing
IP Spoofing Detection in Grid Computing aims to prevent distributed denial-of-service
attacks by identifying and blocking fake IP addresses. This is achieved through various …
attacks by identifying and blocking fake IP addresses. This is achieved through various …