Search Results - distributed denial system

Refine Results
  1. 1

    Distributed Denial-of-Service Defense System by Hanasi, Lidiyawatie

    Published 2006
    “…Distributed denial-of-service (DoS) attacks present a great threat to the Internet, and existing security mechanisms cannot detect or stop them successfully. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    SMRD: a novel cyber warfare modeling framework for Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service based on a system of nonlinear differential equations by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2024
    “…This paper presents a novel cyber warfare modeling framework, Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service (SMRD), capturing the interactions and interdependencies between these core components. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Owing to the distributed nature of modern attacks (e.g. denial-of-service), it is extremely challenging to detect such malicious behaviour using traditional intrusion detection systems. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Distributed Denial of Service detection using hybrid machine learning technique by Barati, Mehdi, Abdullah, Azizol, Udzir, Nur Izura, Mahmod, Ramlan, Mustapha, Norwati

    Published 2014
    “…Distributed Denial of Service (DDoS) is a major threat among many security issues. …”
    Get full text
    Conference or Workshop Item
  7. 7

    Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review by Nuhu Ahmad, Abdul hafiz, Anis Farihan, Mat Raffei, Mohd Faizal, Ab Razak, Ahmad Syafadhli, Abu Bakar

    Published 2024
    “…The explosive growth of Internet of Things (IoT) devices has led to escalating threats from distributed denial of service (DDoS) attacks. Moreover, the scale and heterogeneity of IoT environments pose unique security challenges, and intelligent solutions tailored for the IoT are needed to defend critical infrastructure. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review by Nuhu Ahmad, Abdulhafiz, Anis Farihan, Mat Raffei, Mohd Faizal, Ab Razak, Ahmad, Abubakar

    Published 2024
    “…The explosive growth of Internet of Things (IoT) devices has led to escalating threats from distributed denial of service (DDoS) attacks. Moreover, the scale and heterogeneity of IoT environments pose unique security challenges, and intelligent solutions tailored for the IoT are needed to defend critical infrastructure. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Distributed denial of service detection using stepping stone detection method in internet control message protocol attack by Nor Izham, Subri

    Published 2017
    “…The Distributed Denial of Services (DDoS) is an imminent attack that can threaten cyber security even tough the attack is simple. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An Adaptive Protection of Flooding Attacks Model for Complex Network Environments by Khalaf B.A., Mostafa S.A., Mustapha A., Mohammed M.A., Mahmoud M.A., Al-Rimy B.A.S., Abd Razak S., Elhoseny M., Marks A.

    Published 2023
    “…Autonomous agents; Complex networks; Computational methods; Floods; Internet protocols; Network layers; Network security; Statistical tests; Adaptive protection; Denial of Service; Distributed denial of service; Network applications; Network environments; Potential targets; Simulation systems; Traffic intensity; Denial-of-service attack…”
    Article
  11. 11

    Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes by Waqar, Ali, Sang, Jun, Naeem, Hamad, Naeem, Rashid, Soomro, Ali Raza

    Published 2015
    “…Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. The most vulnerable incident happen when the adversary is committed DDoS (Distributed Denial of Service) attack with comprised cloud network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2022
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Mohammed Saleh Ahmed, Ali, Ali Majeed Alhammadi,, Nafea, Ahmad Khalaf, Bashar, Mostafa, Salama A.

    Published 2023
    “…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
    Get full text
    Get full text
    Get full text
    Article