Filters








116 Hits in 11.8 sec

Mitigating denial-of-service attacks in MANET by distributed packet filtering

Xiaoxin Wu, David K. Y. Yau
<span title="">2007</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS &#39;07</a> </i> &nbsp;
Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish.  ...  A network game can be formulated in which nodes along a network path, in optimizing their own benefits, are encouraged to act collectively to filter out bad packets.  ...  GAME THEORETIC DOS MITIGATION IN MANET Mitigating DoS in MANET We require that legitimate sources digitally sign their packets.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1229285.1229329">doi:10.1145/1229285.1229329</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/WuY07.html">dblp:conf/ccs/WuY07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/p5i2b4ydfbbnvcwcdmyaa3ugym">fatcat:p5i2b4ydfbbnvcwcdmyaa3ugym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813171631/https://www.cs.purdue.edu/homes/lans/20061129/publications/asiaccs2007.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0d/04/0d041924f87a9ccc3788d5efaa34d5af88d5d85f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1229285.1229329"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques

Muhammad AAMIR, Mustafa Ali ZAIDI
<span title="">2013</span> <i title="Graduate School of Information Sciences, Tohoku University"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kwub3pqoxbcqrjctr4lrwwfvhu" style="color: black;">Interdisciplinary Information Sciences</a> </i> &nbsp;
Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services.  ...  The attack employs client server technology and a stream of data packets is sent to the victim for exhausting its services, connections, bandwidth etc.  ...  Distributed Denial of Service Attacks In a Distributed Denial of Service (DDoS) attack, the attacker makes a huge impact on the victim by having multiplied power of attack derived by a large number of  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4036/iis.2013.173">doi:10.4036/iis.2013.173</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pgvcutvfajejpmgatezon5ftdq">fatcat:pgvcutvfajejpmgatezon5ftdq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181102133229/https://www.jstage.jst.go.jp/article/iis/19/2/19_IIS190208/_pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4d/51/4d51b3481e5270b508d6310d79d4d8d60149d574.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4036/iis.2013.173"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A Highly Secured Approach against Attacks in MANETS

G.S. Mamatha, S. C. Sharma
<span title="">2010</span> <i title="IACSIT Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/473y5rd3tfgnvnlxddqa5aqeoa" style="color: black;">Journal of clean energy technologies</a> </i> &nbsp;
This paper proposes a way to identify parallelly different types of attacks in MANETS.  ...  One of the major reasons to address the security aspects in MANETS is the usage of wireless transmission medium, which is highly susceptible or vulnerable to attacks.  ...  only rushing attack, black hole attack, neighbor attack and jellyfish attack [6]. 6) Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach [7]. 7  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijcte.2010.v2.246">doi:10.7763/ijcte.2010.v2.246</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dvzq2n44uffeziiy65bzhqty2a">fatcat:dvzq2n44uffeziiy65bzhqty2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721083937/http://www.ijcte.org/papers/246-G770.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/c1/0fc13109f554657b81b1a37ebaf6c09ff88e3f75.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7763/ijcte.2010.v2.246"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Mitigating Selfish Behavior in Mobile Ad Hoc Networks: A Survey

Mani P, Kamalakkannan P
<span title="2013-07-26">2013</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
In this paper, we review some of the notable works carried out in mitigating selfish behavior on packet forwarding at the network layer, providing a comprehensive comparison between the different proposed  ...  In MANETs, all the routing protocols are designed with an assumption that the nodes will cooperate in packet forwarding.  ...  CORE does not allow a node to distribute negative ratings about other nodes and can resist to simple denial of service attacks that use the security mechanism itself.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/13031-8846">doi:10.5120/13031-8846</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fsgx3caybbem7nhzihthzij2cm">fatcat:fsgx3caybbem7nhzihthzij2cm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160613220651/http://research.ijcaonline.org/volume73/number22/pxc3888846.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/44/d444e57b364c8794975e4f5532e769d5b10a39f1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/13031-8846"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Multi-Hop Advertising Discovery and Delivering Protocol for Multi Administrative Domain MANET

Federico Mari, Igor Melatti, Enrico Tronci, Alberto Finzi
<span title="">2013</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/khqygtfojnby3jyh5obuwd7ko4" style="color: black;">Mobile Information Systems</a> </i> &nbsp;
One of the main obstructions in designing Service Advertising, Discovery and Delivery (SADD) protocol for MAD MANETs is the fact that, in an attempt to increase their own visibility, network nodes tend  ...  In this paper, we present a SADD protocol for MAD MANET, based on Bloom filters, that effectively prevents advertising floods due to such misbehaving nodes.  ...  This may result in flooding which, in turn, leads to a Denial of Service (DoS) attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/621478">doi:10.1155/2013/621478</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/j5ilqthlkjgsdkegxoqvox445a">fatcat:j5ilqthlkjgsdkegxoqvox445a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809133643/http://smarthg.di.uniroma1.it/refbase2/papers/mari/2013/24_Mari_etal2013.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/88/00/8800371edaf458bc0b8ee3c49edef6dfbaa1cb01.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/621478"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

A Secure Mechanism Design-Based and Game Theoretical Model for MANETs

A. Rachedi, A. Benslimane, H. Otrok, N. Mohammed, M. Debbabi
<span title="2009-05-06">2009</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s3esrazljvacznpncbsypxcxwy" style="color: black;">Journal on spesial topics in mobile networks and applications</a> </i> &nbsp;
Here, we consider the tradeoff between security and resource consumption by formulating the problem as a nonzero-sum noncooperative game between the CA and attacker.  ...  Our mechanism will motivate nodes that do not belong to the confident community to participate by giving them incentives in the form of trust, which can be used for cluster's services.  ...  The role of RA nodes is to protect CA node against attack from unknown nodes such as Denial of Service (DoS). Any packet destined to CA node must be analyzed and filtered by RA nodes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11036-009-0164-7">doi:10.1007/s11036-009-0164-7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k26zi2nbibdo7ebquducvnig7m">fatcat:k26zi2nbibdo7ebquducvnig7m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190304053522/https://core.ac.uk/download/pdf/48347165.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/28/9f/289f29f9cf0bcb71d9840d9f036fc11d043978f9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11036-009-0164-7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses

Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa
<span title="2019-02-22">2019</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4d3elkqvznfzho6ki7a35bt47u" style="color: black;">Entropy</a> </i> &nbsp;
We discuss several modeling approaches that are employed for capturing the uncertainty in denial-of-service attack strategies.  ...  In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks.  ...  Distributed denial-of-service attacks and potential approaches of mitigating their effects are explored in [21, 22] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/e21020210">doi:10.3390/e21020210</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/33266925">pmid:33266925</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kbjpmxnfqneqzffufjiem7wuhi">fatcat:kbjpmxnfqneqzffufjiem7wuhi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503194347/https://res.mdpi.com/entropy/entropy-21-00210/article_deploy/entropy-21-00210.pdf?filename=&amp;attachment=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/f9/94f9b4d70c9755106d45a4a7a2c11a826a2db14a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/e21020210"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

A Survey of Intrusion Detection System

Wanda P
<span title="2020-01-07">2020</span> <i title="Pusat Penelitian dan Pengabdian Pada Masyarakat Universitas Respati Yogyakarta"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/m3vgowcvtbfnlnqsyrpuliyl5i" style="color: black;">International Journal of Informatics and Computation</a> </i> &nbsp;
In this paper, we presented a survey on intrusion detection systems (IDS) in several areas.  ...  It consists of Web Application, Cloud Environment, Internet of Things (IoT), Mobile Ad-Hoc Network (MANET), Wireless Sensor Network (WSN) and Voice over Internet Protocol (VOIP)  ...  In A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks -2014, it is claimed that instead of approaches using heuristic and adhoc solutions, there is an increase  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35842/ijicom.v1i1.7">doi:10.35842/ijicom.v1i1.7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/igdlmx2ctbfdlb7se5fagl2m34">fatcat:igdlmx2ctbfdlb7se5fagl2m34</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200715132552/http://ijicom.respati.ac.id/index.php/ijicom/article/download/7/1/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ce/f1/cef1b261febb1886ee9557349e240b1bb69656ef.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35842/ijicom.v1i1.7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Survey of Intrusion Detection Schemes in Wireless Sensor Networks

Fawaz
<span title="2012-10-01">2012</span> <i title="Science Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/myyqjkgwizb57p75zpb2nhqvpe" style="color: black;">American Journal of Applied Sciences</a> </i> &nbsp;
intelligence based, game theoretical based and statistical based.  ...  Detection-based approaches are then proposed to protect WSNs from insider attacks and act as a second line defense after the failure of the prevention-based approaches.  ...  Detecting network intrusions via sampling: a game theoretic approach: Murali and Lakshman (2003) introduced a game theoretic framework for effective detection of network intrusions by developing a network  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/ajassp.2012.1636.1652">doi:10.3844/ajassp.2012.1636.1652</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7ogyqygzfva6bh6xj2ik7zo6pm">fatcat:7ogyqygzfva6bh6xj2ik7zo6pm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171117102729/https://core.ac.uk/download/pdf/25747134.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7c/ff/7cff4c008c1ff0226a3dbd290ce1e1e543cfc34b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3844/ajassp.2012.1636.1652"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Using game theory to model DoS attack and defence

Bhupender Kumar, Bubu Bhuyan
<span title="2019-11-30">2019</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cuymmrn4wzf6xkpjp5avqt7ol4" style="color: black;">Sadhana (Bangalore)</a> </i> &nbsp;
Denial of service (DoS) or distributed denial of service (DDoS) attacks based on bandwidth depletion remain a persistent network security threat and have always been an important issue for system administrators  ...  Results obtained by simulation and numerical calculations are in favour of the proposed game theoretical defence mechanism and strongly advocate the worthiness of using game theory to defend against DoS  ...  Xu and Lee [8] suggested a mechanism based on game theoretic approach to defend a web-service under DoS attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12046-019-1228-4">doi:10.1007/s12046-019-1228-4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y654nv2o35g2losdigywocuyem">fatcat:y654nv2o35g2losdigywocuyem</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200508001556/https://www.ias.ac.in/article/fulltext/sadh/044/12/0245" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/82/7b82e38d34da85a58079a2a66207799bcc51f219.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s12046-019-1228-4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT [article]

Junaid Arshad, Muhammad Ajmal Azad, Khaled Salah, Wei Jie, Razi Iqbal, Mamoun Alazab
<span title="2018-12-21">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Based on a rigorous analysis of the existing intrusion detection approaches, the paper also identifies open challenges for an effective and collaborative design of intrusion detection system for resource-constrained  ...  Alongside the growth of these infrastructures, the volume and variety of attacks on these infrastructures has increased highlighting the significance of distinct protection mechanisms.  ...  Denial of Service attack: Historically, Denial of Service (DoS) attacks are targeted at making the victim unavailable for legitimate service.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1812.09160v1">arXiv:1812.09160v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/j4qevn6gvfbhdgj5smyt4gis6u">fatcat:j4qevn6gvfbhdgj5smyt4gis6u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200916010010/https://arxiv.org/pdf/1812.09160v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4f/30/4f30756e2e746b4c61cfab563be8a773a0bd1482.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1812.09160v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Contents

<span title="">2018</span> <i title="IEEE"> 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) </i> &nbsp;
in OFDM: Interpolation versus ESPRIT 673-678 12.5 1570416635 A novel Approach to Energy efficient low cost Routing in MANET by reduction in packet size 679-684 12.6 1570416799 Gaussian Mixture  ...  3.15 1570417754 Security, SDN, and VANET Technology of Driver-less Cars 313-316 3.16 1570419769 Mitigating Wormhole Attack in MANET Using Absolute Deviation Statistical Approach 317-320 4  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ccwc.2018.8301783">doi:10.1109/ccwc.2018.8301783</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qmdq273aojbarcn2gszmz6yyx4">fatcat:qmdq273aojbarcn2gszmz6yyx4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210717122423/https://ieeexplore.ieee.org/ielx7/8293728/8301613/08301783.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c2/49/c2496f56a3b9fb13d1255b09fbd1dde1eeb6ead0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ccwc.2018.8301783"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

FlowSM: Flow Scheduling Mechanism in Coordinated Mitigation of Large-Scale DDoS Attacks

ZILLUR RAHAMAN, Zhang Jian
<span title="2021-05-14">2021</span> <i title="Zenodo"> Zenodo </i> &nbsp;
In this research paper, we propose a distribute approach to defend against DDoS attacks by coordinating flow scheduling mechanism across into the network.  ...  Weight deficit flow would to find the highest capacity of nodes in a network and assign weight ratio of those nodes.  ...  Distributed Denial of Service (DDoS) is a type of attack in which the attacker tries to degrade the performance of server or network so that the 2/3 servers may not provide service to legitimate users.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.6637677">doi:10.5281/zenodo.6637677</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4u5afe36zbaqficpmu42ftutsa">fatcat:4u5afe36zbaqficpmu42ftutsa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220615043849/https://zenodo.org/record/6637677/files/FlowSM-Flow-Scheduling-Mechanism-in-Coordinated-Mitigation-of-Large-Scale-DDoS-Attacks.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b2/08/b2081598e1673efe2f42cd3186d17ed6dfb4f760.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.6637677"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

SOME INVESTIGATIONS ON IMPROVING PERFORMANCE OF FADING CANNELS IN MANETS

Dr. Anbu Karuppusamy S
<span title="2021-07-30">2021</span> <i title="Zenodo"> Zenodo </i> &nbsp;
SOME INVESTIGATIONS ON IMPROVING PERFORMANCE OF FADING CANNELS IN MANETS: D.Sc Thesis.  ...  The objective of the filter is to serve like the typical matched filter. The features of filters contribute in framing the approaches which are needed in order to mitigate the filter-induced ISI.  ...  This attack is Denial of Service (DoS) type. b. Active Attack Information gathered during the passive attack in such a way that the user is compromised or network gets damaged.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5148816">doi:10.5281/zenodo.5148816</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3p7mvkqddfa6naoaz55fnelolq">fatcat:3p7mvkqddfa6naoaz55fnelolq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210802163157/https://zenodo.org/record/5148816/files/Dr.Anbu%20Karuppusamy%20S-DSc%20Thesis.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d2/cf/d2cf5de27f19f6d62cf617705b0a98eaa7b43585.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.5148816"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions [article]

Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti and Rajkumar Buyya
<span title="2015-12-27">2015</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Distributed Denial of Service (DDoS) attack is one such serious attack in the cloud space. In this paper, we present developments related to DDoS attack mitigation solutions in the cloud.  ...  In particular, we present a comprehensive survey with a detailed insight into the characterization, prevention, detection, and mitigation mechanisms of these attacks.  ...  Cloud based gaming services of Microsoft and Sony were attacked by Lizard Squad which proved to be a fatal attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1512.08187v1">arXiv:1512.08187v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kcri3hp6tbh7flnz2q35a5msua">fatcat:kcri3hp6tbh7flnz2q35a5msua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200910004625/https://arxiv.org/pdf/1512.08187v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ab/d2/abd24b41ad6a552c8e030dee427a3f60157febfc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1512.08187v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 116 results