Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Denial-of-Service" wg kryterium: Temat


Wyświetlanie 1-8 z 8
Tytuł:
An Efficient Hybrid Protocol Framework for DDoS Attack Detection and Mitigation Using Evolutionary Technique
Autorzy:
Yerriswamy, T.
Gururaj, Murtugudde
Powiązania:
https://bibliotekanauki.pl/articles/2176173.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
deep entropy based scheme
denial of service
distributed denial of service
flash crowd
high-rate DDoS
inner service trackback
outer advanced blocking
Opis:
The ever-increasing use of the Internet has created massive amounts network traffic, causing problems related to its scalability, controllability, and manageability. Sophisticated network-based denial of service (DoS) and distributed denial of service (DDoS) attacks increasingly pose a future threat. The literature proposes various methods that may help stop all HTTP DoS/DDoS assaults, but no optimal solution has been identified so far. Therefore, this paper attempts to fill the gap by proposing an alternative solution known as an efficient hybrid protocol framework for distributed DoS attack detection and mitigation (E-HPFDDM). Such an architecture addresses all aspects of these assaults by relaying on a three-layer mechanism. Layer 1 uses the outer advanced blocking (OAB) scheme which blocks unauthorized IP sources using an advanced backlisted table. Layer 2 is a validation layer that relies on the inner service trackback (IST) scheme to help determine whether the inbound request has been initiated by a legitimate or an illegitimate user. Layer 3 (inner layer) uses the deep entropy based (DEB) scheme to identify, classify and mitigate high-rate DDoS (HR-DDoS) and flash crowd (FC) attacks. The research shows that in contrast to earlier studies, the structure of the proposed system offers effective defense against DoS/DDoS assaults for web applications.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 4; 77--82
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design a robust quantitative feedback theory controller for cyber-physical systems: ship course control problem
Autorzy:
Abadi, Ali Soltani Sharif
Hosseinabadi, Pooyan Alinaghi
Ordys, Andrew
Grimble, Michael
Powiązania:
https://bibliotekanauki.pl/articles/2175111.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
quantitative feedback theory
Denial-of-Service
robust control
cyber-physical systems
Opis:
One of the most critical problems in all practical systems is the presence of uncertainties, internal and external disturbances, as well as disturbing noise, which makes the control of the system a challenging task. Another challenge with the physical systems is the possibility of cyber-attacks that the system’s cyber security against them is a critical issue. The systems related to oil and gas industries may also be subjected to cyber-attacks. The subsets of these industries can be mentioned to the oil and gas transmission industry, where ships have a critical role. This paper uses the Quantitative Feedback Theory (QFT) method to design a robust controller for the ship course system, aiming towards desired trajectory tracking. The proposed controller is robust against all uncertainties, internal and external disturbances, noise, and various possible Deception, Stealth, and Denial-of-Service (DOS) attacks. The robust controller for the ship system is designed using the QFT method and the QFTCT toolbox in MATLAB software. Numerical simulations are performed in MATLAB/Simulink for two case studies with disturbances and attacks involving intermittent sinusoidal and random behavior to demonstrate the proposed controller.
Źródło:
Archives of Control Sciences; 2022, 32, 3; 589--605
1230-2384
Pojawia się w:
Archives of Control Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Implementation of Efficient Inline DDoS Detector Based on AATAC Algorithm
Autorzy:
Wiśniewski, Piotr
Sosnowski, Maciej
Burakowski, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/2200718.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
DDoS
Distributed Denial of Service
traffic anomaly detection
AATAC
performance
DPDK
Opis:
Distributed Denial of Service (DDoS) attacks constitute a major threat in the current Internet. These cyber-attacks aim to flood the target system with tailored malicious network traffic overwhelming its service capacity and consequently severely limiting legitimate users from using the service. This paper builds on the state-of-the-art AATAC algorithm (Autonomous Algorithm for Traffic Anomaly Detection) and provides a concept of a dedicated inline DDoS detector capable of real-time monitoring of network traffic and near-real-time anomaly detection. The inline DDoS detector consists of two main elements: 1) inline probe(s) responsible for link-rate real-time processing and monitoring of network traffic with custom-built packet feature counters, and 2) an analyser that performs the near-real-time statistical analysis of these counters for anomaly detection. These elements communicate asynchronously via the Redis database, facilitating a wide range of deployment scenarios. The inline probes are based on COTS servers and utilise the DPDK framework (Data Plane Development Kit) and parallel packet processing on multiple CPU cores to achieve link rate traffic analysis, including tailored DPI analysis.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 4; 889--898
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nordic Countries in the Face of Digital Threats
Autorzy:
Kaczmarek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/31342009.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Nordic cooperation
cyber threats
digital skills
DDoS (Distributed Denial of Service)
Opis:
Technological advances and the digital revolution have caused much of social activity to move online. The Internet has become a tool without which it is difficult to imagine the functioning of modern states. However, it is also some of conflicts between states that have moved online, and states with the highest degree of digitization, which include the Nordic states, have become a target of attacks by other states or organizations. In this article, the Author will attempt to answer the question of how the Nordic states and their societies defend themselves against cyber threats. The characteristics of the attacks carried out against them and the levels of digitization of the societies will also be compared.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 151-161
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Surveillance and Sequestration Issues of Internet of Things (SSIoT)
Autorzy:
Banu, Reshma
Taranum, Ayesha
Powiązania:
https://bibliotekanauki.pl/articles/1193564.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DDoS Attack
Denial of Service
Internet of Things
RFID
Surveillance
WSN
sequestration
Opis:
A direct interpretation of the term Internet of Things refers to the use of standard Internet protocols for the human-to-thing or thing- to-thing communication in embedded networks. Although the security needs are well-recognized in this domain, it is still not fully understood how existing IP security protocols and architectures can be deployed. In this paper, we discuss the applicability and limitations of existing Inter- net protocols and security architectures in the context of the Internet of Things. First, we give an overview of the deployment model and general security needs. We then present challenges and requirements for IP-based security solutions and highlight technical limitations of standard IP security protocols. Focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
Źródło:
World Scientific News; 2016, 41; 171-185
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Battery Drain Denial-of-Service Attacks and Defenses in the Internet of Things
Autorzy:
Ioulianou, Philokypros P.
Vassilakis, Vassilios G.
Logothetis, Michael D.
Powiązania:
https://bibliotekanauki.pl/articles/308296.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
battery drain
ContikiOS
Cooja simulator
denial-of-service
intrusion detection
IoT
RPL
Opis:
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a popular routing protocol used in wireless sensor networks and in the Internet of Things (IoT). RPL was standardized by the IETF in 2012 and has been designed for devices with limited resources and capabilities. Open-source RPL implementations are supported by popular IoT operating systems (OS), such as ContikiOS and TinyOS. In this work, we investigate the possibility of battery drain Denial-of-Service (DoS) attacks in the RPL implementation of ContikiOS. In particular, we use the popular Cooja simulator and implement two types of DoS attacks, particularly version number modification and “Hello” flooding. We demonstrate the impact of these attacks on the power consumption of IoT devices. Finally, we discuss potential defenses relying on distributed intrusion detection modules.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 37-45
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automatic detection of DoS vulnerabilities of cryptographic protocols
Autorzy:
Krawczyk, U.
Sapiecha, P.
Powiązania:
https://bibliotekanauki.pl/articles/106293.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
automatic detection
DoS
denial of service attacks
Petri net
SPIN model checker
Opis:
In this article the subject of DoS vulnerabilities of cryptographic key establishment and authentication protocols is discussed. The system for computer-aided DoS protocol resistance analysis, which employs the Petri nets formalism and Spin model-checker, is presented.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 51-67
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detection of distributed denial of service attacks for IoT-based healthcare systems
Autorzy:
Kaur, Gaganjot
Gupta, Prinima
Powiązania:
https://bibliotekanauki.pl/articles/38701793.pdf
Data publikacji:
2023
Wydawca:
Instytut Podstawowych Problemów Techniki PAN
Tematy:
software defined networking
k-nearest neighbors
distributed denial of service
DPTCM-KNN approach
SVM
sieci definiowane programowo
k-najbliższy sąsiad
rozproszona odmowa usługi
Opis:
One of the major common assaults in the current Internet of things (IoT) network-based healthcare infrastructures is distributed denial of service (DDoS). The most challenging task in the current environment is to manage the creation of vast multimedia data from the IoT devices, which is difficult to be handled solely through the cloud. As the software defined networking (SDN) is still in its early stages, sampling-oriented measurement techniques used today in the IoT network produce low accuracy, increased memory usage, low attack detection, higher processing and network overheads. The aim of this research is to improve attack detection accuracy by using the DPTCM-KNN approach. The DPTCMKNN technique outperforms support vector machine (SVM), yet it still has to be improved. For healthcare systems, this work develops a unique approach for detecting DDoS assaults on SDN using DPTCM-KNN.
Źródło:
Computer Assisted Methods in Engineering and Science; 2023, 30, 2; 167-186
2299-3649
Pojawia się w:
Computer Assisted Methods in Engineering and Science
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-8 z 8

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies