A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
Profiling-as-a-Service in Multi-tenant Cloud Computing Environments
2012
2012 32nd International Conference on Distributed Computing Systems Workshops
The proposed architecture will not only provide an in-depth understanding on traffic patterns of cloud tenants, but also enhance the security of cloud computing by collaboratively detecting and filtering ...
To enhance the security of networks, applications and data in the cloud, this position paper proposes to develop a profiling-as-a-service architecture to characterize, understand and profile network traffic ...
architecture, such as large volume of network traffic during denial of service attacks. ...
doi:10.1109/icdcsw.2012.88
dblp:conf/icdcsw/XuWG12
fatcat:saxrvqtr2na53fbheleet55qhm
A Review on DDOS Prevention and Detection Methodology
2015
The International Journal of Ambient Systems and Applications
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security. Network is collection of nodes that interconnect with each other for exchange the Information. ...
One of the major threats to internet service is DDoS (Distributed denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to target node. ...
A DDoS or DoS attack is small for Distributed Denial of Service attack, which is developed on the concept of DoS attack and the multiple distributed attack sources. ...
doi:10.5121/ijasa.2015.3301
fatcat:etbfenbgpng7xgnfk64sorhuke
A Review Towards DDoS Prevention and Detection Methodology
2015
International Journal of Computational Science and Information Technology
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security. Network is collection of nodes that interconnect with each other for exchange the Information. ...
One of the major threats to internet service is DDoS (Distributed denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to target node. ...
A DDoS or DoS attack is small for Distributed Denial of Service attack, which is developed on the concept of DoS attack and the multiple distributed attack sources. ...
doi:10.5121/ijcsity.2015.3301
fatcat:c7665mejwbg3hcscryxitpi5mm
A statistical and distributed packet filter against DDoS attacks in Cloud environment
2018
Sadhana (Bangalore)
In this paper, a statistical and distributed network packet filtering model is proposed against DDoS attacks in Cloud. ...
Distributed Denial of Service (DDoS) attacks are a serious threat to Cloud. These attacks consume large amount of resources and increase the service usage cost by a significant factor. ...
Introduction Distributed Denial of Service (DDoS) attack is a type of intrusion that exhausts resources and services of an individual or organisation by sending useless traffic, so that legitimate users ...
doi:10.1007/s12046-018-0800-7
fatcat:y2lh57lgpnbrzae7sqrkzvkkam
Effective and Reliable Countermeasures for Detecting DDOS Attack in IDS
2015
International Journal of Engineering Research and
of service and distributed denial of service attacks. ...
Distributed denial of service is an attack by which the legitimated users are victimized for service and resource available. ...
Distributed Denial of Service (DDOS) attack is an effort to flood a victim by means of network/machines through a volume of traffic that is generated by several machines. ...
doi:10.17577/ijertv4is030923
fatcat:lze5v3masrhexkjnpoywt6a3r4
Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural Network
2017
International Journal of Computer Network and Information Security
One of the dangers faced by various organizations and institutions operating in the cyberspace is Distributed Denial of Service (DDoS) attacks; it is carried out through the internet. ...
The aim of this work is to detect and classify DDoS attack traffics and normal traffics using multi layered feed forward (FFANN) technique as a tool to develop model. ...
ACKNOWLEDGEMENTS The authors would like to acknowledge and appreciate the Department of Cyber Security, Federal University of Technology, Minna, Nigeria for their support. Computing ...
doi:10.5815/ijcnis.2017.12.04
fatcat:73apkhjhijfhrfaro6c2o435kq
A SECURED AND ENHANCED MITIGATION FRAMEWORK FOR DDOS ATTACKS
2019
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
Because each bot in a botnet makes seemingly legitimate network requests the traffic is not spoofed and may appear "normal" in origin. ...
Distinguishing between attack traffic and normal traffic is difficult, especially in the case of a application layer attack such as a botnet performing a HTTP Flood attack against a victim's server. ...
and private a distributed denial of service attack protection service that is operable to filter or otherwise mitigate malicious traffic involved in the distributed denial of he authors proposed intended ...
doi:10.26782/jmcms.2019.12.00075
fatcat:nmydxblxijasrlh3oj24nhdwna
Review Of Syn-Flooding Attack Detection Mechanism
2012
International Journal of Distributed and Parallel systems
Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. ...
resources, especially in critical real-time services such as in e-commerce and the medical field. ...
artificial neural network to detect multi class of denial of services (DoS) attacks. ...
doi:10.5121/ijdps.2012.3108
fatcat:mv5dhln4obaslpyc5z5g2t3z64
SDN-enabled Traffic Engineering and Advanced Blackholing at IXPs
2017
Proceedings of the Symposium on SDN Research - SOSR '17
We demonstrate here our implementations of traffic engineering and Distributed Denial of Service mitigation, as well as how member networks cash in on the advanced SDN-features of EN-DEAVOUR, typically ...
not available in legacy networks. ...
Acknowledgments: This research is (in part) supported by European Union's Horizon 2020 research and innovation programme under the ENDEAVOUR project (grant agreement 644960). ...
doi:10.1145/3050220.3060601
dblp:conf/sosr/DietzelACFCK17
fatcat:gaikvltq75esrf5yqm62m62wqa
Review of syn-flooding attack detection mechanism
[article]
2012
arXiv
pre-print
Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses. ...
resources, especially in critical real-time services such as in e-commerce and the medical field. ...
artificial neural network to detect multi class of denial of services (DoS) attacks. ...
arXiv:1202.1761v1
fatcat:nfmkyb5gsjgnvk5snzxj6qcze4
Blockchain Technology towards the Mitigation of Distributed Denial of Service Attacks
2020
International journal of recent technology and engineering
The Distributed Denial of Service attack become one of the most adverse effects among all Cyber-attack due to the high availability of the internet and unprotected internetconnected communication devices ...
The solution of DDoS attacks that utilize the blockchain is still in the infancy phase. In this paper, we propose the review or survey of DDoS attacks solutions based on blockchain. ...
INTRODUCTION Distributed Denial of Service Attacks is a threat related to the availability of systems or services. ...
doi:10.35940/ijrte.f7420.038620
fatcat:n53tansznnhipfrchi2ipugyoe
Effectiveness of Application Layer Denial of Service Counter- Measures in Cloud Computing
2019
Zenodo
Denial of Service (XDDoS)) which are application based denial of service in software as a service (SaaS) cloud computing service model. ...
Studies so far have shown remarkable efforts in the area of cloud computing security but has paid little attention to the area of application based denial of service and its distributed variant. ...
-Private Cloud Topology
Fig. 3 : 3 -Distributed XML-based Denial of Service attack, where CTB and Cloud Protector are located just between each cloud web service, in order to detect and filter X-DoS ...
doi:10.5281/zenodo.3516696
fatcat:lcf2ltjd4bh6hpnqhflw73bfrq
Denial of service mitigation approach for IPv6-enabled smart object networks
2012
Concurrency and Computation
The denial of service attacks is more expressive in smart object networks. ...
In fact, there are several standard techniques used in traditional computing to mitigate the effects of some of the more common denial of service techniques, although this is still an open problem to the ...
Acknowledgements This work has been partially supported by the Instituto de Telecomunicações, Next Generation Networks and Applications Group (NetGNA), Portugal, and by National Funding from the FCT -Fundação ...
doi:10.1002/cpe.2850
fatcat:p44x6tctojdhfjv2dzu4j33spi
An Elastic Scaling Method for Cloud Security
2014
Journal of Internet Technology and Secured Transaction
A cyber disruption in this context means a temporary or permanent loss of service, with impact on users of the cloud service who rely on its continuity. ...
Cloud computing is being adopted in critical sectors such as transport, energy and finance. This makes cloud computing services critical in themselves. ...
The Notorious Nine -Cloud Computing Top Threats in 2013" [23] includes distributed denial of service (DDoS) as a key threat, not originally considered in 2010. ...
doi:10.20533/jitst.2046.3723.2014.0033
fatcat:clpuohbkxrgk5ksdj2rxjrtrzu
Denial of Service: Another Example
[chapter]
2002
IFIP Advances in Information and Communication Technology
In this paper, a different type of network denial of service attack is discussed. ...
Although denial of service attack has been becoming a fastgrowing concern in security research, previous work focused on a type of classical denial of service caused by resource exhaustion. ...
The author is grateful to anonymous reviewers of ACM NSPW'OI (New Security Paradigm Workshop) and IFIP SEC2002 for their helpful comments. ...
doi:10.1007/978-0-387-35586-3_12
fatcat:ba5pdp2mufddvoiviq3yiqu6qi
« Previous
Showing results 1 — 15 out of 7,798 results