Filters








7,798 Hits in 4.8 sec

Profiling-as-a-Service in Multi-tenant Cloud Computing Environments

Kuai Xu, Feng Wang, Lin Gu
2012 2012 32nd International Conference on Distributed Computing Systems Workshops  
The proposed architecture will not only provide an in-depth understanding on traffic patterns of cloud tenants, but also enhance the security of cloud computing by collaboratively detecting and filtering  ...  To enhance the security of networks, applications and data in the cloud, this position paper proposes to develop a profiling-as-a-service architecture to characterize, understand and profile network traffic  ...  architecture, such as large volume of network traffic during denial of service attacks.  ... 
doi:10.1109/icdcsw.2012.88 dblp:conf/icdcsw/XuWG12 fatcat:saxrvqtr2na53fbheleet55qhm

A Review on DDOS Prevention and Detection Methodology

Subramaniam T.K, Deepa B
2015 The International Journal of Ambient Systems and Applications  
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security. Network is collection of nodes that interconnect with each other for exchange the Information.  ...  One of the major threats to internet service is DDoS (Distributed denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to target node.  ...  A DDoS or DoS attack is small for Distributed Denial of Service attack, which is developed on the concept of DoS attack and the multiple distributed attack sources.  ... 
doi:10.5121/ijasa.2015.3301 fatcat:etbfenbgpng7xgnfk64sorhuke

A Review Towards DDoS Prevention and Detection Methodology

Subramaniam T.K, Deepa B
2015 International Journal of Computational Science and Information Technology  
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security. Network is collection of nodes that interconnect with each other for exchange the Information.  ...  One of the major threats to internet service is DDoS (Distributed denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to target node.  ...  A DDoS or DoS attack is small for Distributed Denial of Service attack, which is developed on the concept of DoS attack and the multiple distributed attack sources.  ... 
doi:10.5121/ijcsity.2015.3301 fatcat:c7665mejwbg3hcscryxitpi5mm

A statistical and distributed packet filter against DDoS attacks in Cloud environment

VIKASH C PANDEY, SATEESH K PEDDOJU, PRACHI S DESHPANDE
2018 Sadhana (Bangalore)  
In this paper, a statistical and distributed network packet filtering model is proposed against DDoS attacks in Cloud.  ...  Distributed Denial of Service (DDoS) attacks are a serious threat to Cloud. These attacks consume large amount of resources and increase the service usage cost by a significant factor.  ...  Introduction Distributed Denial of Service (DDoS) attack is a type of intrusion that exhausts resources and services of an individual or organisation by sending useless traffic, so that legitimate users  ... 
doi:10.1007/s12046-018-0800-7 fatcat:y2lh57lgpnbrzae7sqrkzvkkam

Effective and Reliable Countermeasures for Detecting DDOS Attack in IDS

Mohammad Abrahim Wani, Rshma Chawla
2015 International Journal of Engineering Research and  
of service and distributed denial of service attacks.  ...  Distributed denial of service is an attack by which the legitimated users are victimized for service and resource available.  ...  Distributed Denial of Service (DDOS) attack is an effort to flood a victim by means of network/machines through a volume of traffic that is generated by several machines.  ... 
doi:10.17577/ijertv4is030923 fatcat:lze5v3masrhexkjnpoywt6a3r4

Distributed Denial of Service Detection using Multi Layered Feed Forward Artificial Neural Network

Ismaila Idris, Obi Blessing Fabian, Shafi'i M. Abdulhamid, Morufu Olalere, Baba Meshach
2017 International Journal of Computer Network and Information Security  
One of the dangers faced by various organizations and institutions operating in the cyberspace is Distributed Denial of Service (DDoS) attacks; it is carried out through the internet.  ...  The aim of this work is to detect and classify DDoS attack traffics and normal traffics using multi layered feed forward (FFANN) technique as a tool to develop model.  ...  ACKNOWLEDGEMENTS The authors would like to acknowledge and appreciate the Department of Cyber Security, Federal University of Technology, Minna, Nigeria for their support. Computing  ... 
doi:10.5815/ijcnis.2017.12.04 fatcat:73apkhjhijfhrfaro6c2o435kq

A SECURED AND ENHANCED MITIGATION FRAMEWORK FOR DDOS ATTACKS

Mujahid shah
2019 JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES  
Because each bot in a botnet makes seemingly legitimate network requests the traffic is not spoofed and may appear "normal" in origin.  ...  Distinguishing between attack traffic and normal traffic is difficult, especially in the case of a application layer attack such as a botnet performing a HTTP Flood attack against a victim's server.  ...  and private a distributed denial of service attack protection service that is operable to filter or otherwise mitigate malicious traffic involved in the distributed denial of he authors proposed intended  ... 
doi:10.26782/jmcms.2019.12.00075 fatcat:nmydxblxijasrlh3oj24nhdwna

Review Of Syn-Flooding Attack Detection Mechanism

Mehdi Ebady Manna
2012 International Journal of Distributed and Parallel systems  
Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses.  ...  resources, especially in critical real-time services such as in e-commerce and the medical field.  ...  artificial neural network to detect multi class of denial of services (DoS) attacks.  ... 
doi:10.5121/ijdps.2012.3108 fatcat:mv5dhln4obaslpyc5z5g2t3z64

SDN-enabled Traffic Engineering and Advanced Blackholing at IXPs

Christoph Dietzel, Gianni Antichi, Ignacio Castro, Eder L. Fernandes, Marco Chiesa, Daniel Kopp
2017 Proceedings of the Symposium on SDN Research - SOSR '17  
We demonstrate here our implementations of traffic engineering and Distributed Denial of Service mitigation, as well as how member networks cash in on the advanced SDN-features of EN-DEAVOUR, typically  ...  not available in legacy networks.  ...  Acknowledgments: This research is (in part) supported by European Union's Horizon 2020 research and innovation programme under the ENDEAVOUR project (grant agreement 644960).  ... 
doi:10.1145/3050220.3060601 dblp:conf/sosr/DietzelACFCK17 fatcat:gaikvltq75esrf5yqm62m62wqa

Review of syn-flooding attack detection mechanism [article]

Mehdi Ebady Manna, Angela Amphawan
2012 arXiv   pre-print
Denial of Service (DoS) is a security threat which compromises the confidentiality of information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP addresses.  ...  resources, especially in critical real-time services such as in e-commerce and the medical field.  ...  artificial neural network to detect multi class of denial of services (DoS) attacks.  ... 
arXiv:1202.1761v1 fatcat:nfmkyb5gsjgnvk5snzxj6qcze4

Blockchain Technology towards the Mitigation of Distributed Denial of Service Attacks

2020 International journal of recent technology and engineering  
The Distributed Denial of Service attack become one of the most adverse effects among all Cyber-attack due to the high availability of the internet and unprotected internetconnected communication devices  ...  The solution of DDoS attacks that utilize the blockchain is still in the infancy phase. In this paper, we propose the review or survey of DDoS attacks solutions based on blockchain.  ...  INTRODUCTION Distributed Denial of Service Attacks is a threat related to the availability of systems or services.  ... 
doi:10.35940/ijrte.f7420.038620 fatcat:n53tansznnhipfrchi2ipugyoe

Effectiveness of Application Layer Denial of Service Counter- Measures in Cloud Computing

Kolawole Abolarin, Mofoluke Akoja
2019 Zenodo  
Denial of Service (XDDoS)) which are application based denial of service in software as a service (SaaS) cloud computing service model.  ...  Studies so far have shown remarkable efforts in the area of cloud computing security but has paid little attention to the area of application based denial of service and its distributed variant.  ...  -Private Cloud Topology Fig. 3 : 3 -Distributed XML-based Denial of Service attack, where CTB and Cloud Protector are located just between each cloud web service, in order to detect and filter X-DoS  ... 
doi:10.5281/zenodo.3516696 fatcat:lcf2ltjd4bh6hpnqhflw73bfrq

Denial of service mitigation approach for IPv6-enabled smart object networks

Luís M. L. Oliveira, Joel J. P. C. Rodrigues, Amaro F. de Sousa, Jaime Lloret
2012 Concurrency and Computation  
The denial of service attacks is more expressive in smart object networks.  ...  In fact, there are several standard techniques used in traditional computing to mitigate the effects of some of the more common denial of service techniques, although this is still an open problem to the  ...  Acknowledgements This work has been partially supported by the Instituto de Telecomunicações, Next Generation Networks and Applications Group (NetGNA), Portugal, and by National Funding from the FCT -Fundação  ... 
doi:10.1002/cpe.2850 fatcat:p44x6tctojdhfjv2dzu4j33spi

An Elastic Scaling Method for Cloud Security

Áine MacDermott, Qi Shi, Madjid Merabti, Kashif Kifayat
2014 Journal of Internet Technology and Secured Transaction  
A cyber disruption in this context means a temporary or permanent loss of service, with impact on users of the cloud service who rely on its continuity.  ...  Cloud computing is being adopted in critical sectors such as transport, energy and finance. This makes cloud computing services critical in themselves.  ...  The Notorious Nine -Cloud Computing Top Threats in 2013" [23] includes distributed denial of service (DDoS) as a key threat, not originally considered in 2010.  ... 
doi:10.20533/jitst.2046.3723.2014.0033 fatcat:clpuohbkxrgk5ksdj2rxjrtrzu

Denial of Service: Another Example [chapter]

Jianxin Jeff Yan
2002 IFIP Advances in Information and Communication Technology  
In this paper, a different type of network denial of service attack is discussed.  ...  Although denial of service attack has been becoming a fastgrowing concern in security research, previous work focused on a type of classical denial of service caused by resource exhaustion.  ...  The author is grateful to anonymous reviewers of ACM NSPW'OI (New Security Paradigm Workshop) and IFIP SEC2002 for their helpful comments.  ... 
doi:10.1007/978-0-387-35586-3_12 fatcat:ba5pdp2mufddvoiviq3yiqu6qi
« Previous Showing results 1 — 15 out of 7,798 results