Search Results - distributed denial system
Search alternatives:
- denial system »
- distributed »
-
1
Distributed Denial-of-Service Defense System
Published 2006“…Distributed denial-of-service (DoS) attacks present a great threat to the Internet, and existing security mechanisms cannot detect or stop them successfully. …”
Get full text
Get full text
Final Year Project -
2
Distributed denial of service defense system / Lidiyawatie Hanasi, TK 5105.59 .L712 2006
Published 2006Get full text
Get full text
Final Year Project -
3
Analysis and identification of distributed denial of service attacks using intra-domain messaging schemes
Published 2024“…This research discusses security systems against Distributed Denial-of-Service (DDoS) attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
SMRD: a novel cyber warfare modeling framework for Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service based on a system of nonlinear differential equations
Published 2024“…This paper presents a novel cyber warfare modeling framework, Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service (SMRD), capturing the interactions and interdependencies between these core components. …”
Get full text
Get full text
Get full text
Article -
5
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Owing to the distributed nature of modern attacks (e.g. denial-of-service), it is extremely challenging to detect such malicious behaviour using traditional intrusion detection systems. …”
Get full text
Get full text
Thesis -
6
Distributed Denial of Service detection using hybrid machine learning technique
Published 2014“…Distributed Denial of Service (DDoS) is a major threat among many security issues. …”
Get full text
Conference or Workshop Item -
7
Distributed denial of service attack Detection in IoT networks using deep learning and feature fusion : A review
Published 2024“…The explosive growth of Internet of Things (IoT) devices has led to escalating threats from distributed denial of service (DDoS) attacks. Moreover, the scale and heterogeneity of IoT environments pose unique security challenges, and intelligent solutions tailored for the IoT are needed to defend critical infrastructure. …”
Get full text
Get full text
Get full text
Article -
8
Distributed Denial of Service Attack Detection in IoT Networks using Deep Learning and Feature Fusion: A Review
Published 2024“…The explosive growth of Internet of Things (IoT) devices has led to escalating threats from distributed denial of service (DDoS) attacks. Moreover, the scale and heterogeneity of IoT environments pose unique security challenges, and intelligent solutions tailored for the IoT are needed to defend critical infrastructure. …”
Get full text
Get full text
Get full text
Article -
9
Distributed denial of service detection using stepping stone detection method in internet control message protocol attack
Published 2017“…The Distributed Denial of Services (DDoS) is an imminent attack that can threaten cyber security even tough the attack is simple. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments
Published 2023“…Autonomous agents; Complex networks; Computational methods; Floods; Internet protocols; Network layers; Network security; Statistical tests; Adaptive protection; Denial of Service; Distributed denial of service; Network applications; Network environments; Potential targets; Simulation systems; Traffic intensity; Denial-of-service attack…”
Article -
11
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
Published 2015“…Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. The most vulnerable incident happen when the adversary is committed DDoS (Distributed Denial of Service) attack with comprised cloud network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
15
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. …”
Get full text
Get full text
Get full text
Article
