Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "distributed denial of service" wg kryterium: Temat


Wyświetlanie 1-4 z 4
Tytuł:
Nordic Countries in the Face of Digital Threats
Autorzy:
Kaczmarek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/31342009.pdf
Data publikacji:
2024-05-09
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Nordic cooperation
cyber threats
digital skills
DDoS (Distributed Denial of Service)
Opis:
Technological advances and the digital revolution have caused much of social activity to move online. The Internet has become a tool without which it is difficult to imagine the functioning of modern states. However, it is also some of conflicts between states that have moved online, and states with the highest degree of digitization, which include the Nordic states, have become a target of attacks by other states or organizations. In this article, the Author will attempt to answer the question of how the Nordic states and their societies defend themselves against cyber threats. The characteristics of the attacks carried out against them and the levels of digitization of the societies will also be compared.
Źródło:
Cybersecurity and Law; 2024, 11, 1; 151-161
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detection of distributed denial of service attacks for IoT-based healthcare systems
Autorzy:
Kaur, Gaganjot
Gupta, Prinima
Powiązania:
https://bibliotekanauki.pl/articles/38701793.pdf
Data publikacji:
2023
Wydawca:
Instytut Podstawowych Problemów Techniki PAN
Tematy:
software defined networking
k-nearest neighbors
distributed denial of service
DPTCM-KNN approach
SVM
sieci definiowane programowo
k-najbliższy sąsiad
rozproszona odmowa usługi
Opis:
One of the major common assaults in the current Internet of things (IoT) network-based healthcare infrastructures is distributed denial of service (DDoS). The most challenging task in the current environment is to manage the creation of vast multimedia data from the IoT devices, which is difficult to be handled solely through the cloud. As the software defined networking (SDN) is still in its early stages, sampling-oriented measurement techniques used today in the IoT network produce low accuracy, increased memory usage, low attack detection, higher processing and network overheads. The aim of this research is to improve attack detection accuracy by using the DPTCM-KNN approach. The DPTCMKNN technique outperforms support vector machine (SVM), yet it still has to be improved. For healthcare systems, this work develops a unique approach for detecting DDoS assaults on SDN using DPTCM-KNN.
Źródło:
Computer Assisted Methods in Engineering and Science; 2023, 30, 2; 167-186
2299-3649
Pojawia się w:
Computer Assisted Methods in Engineering and Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Efficient Hybrid Protocol Framework for DDoS Attack Detection and Mitigation Using Evolutionary Technique
Autorzy:
Yerriswamy, T.
Gururaj, Murtugudde
Powiązania:
https://bibliotekanauki.pl/articles/2176173.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
deep entropy based scheme
denial of service
distributed denial of service
flash crowd
high-rate DDoS
inner service trackback
outer advanced blocking
Opis:
The ever-increasing use of the Internet has created massive amounts network traffic, causing problems related to its scalability, controllability, and manageability. Sophisticated network-based denial of service (DoS) and distributed denial of service (DDoS) attacks increasingly pose a future threat. The literature proposes various methods that may help stop all HTTP DoS/DDoS assaults, but no optimal solution has been identified so far. Therefore, this paper attempts to fill the gap by proposing an alternative solution known as an efficient hybrid protocol framework for distributed DoS attack detection and mitigation (E-HPFDDM). Such an architecture addresses all aspects of these assaults by relaying on a three-layer mechanism. Layer 1 uses the outer advanced blocking (OAB) scheme which blocks unauthorized IP sources using an advanced backlisted table. Layer 2 is a validation layer that relies on the inner service trackback (IST) scheme to help determine whether the inbound request has been initiated by a legitimate or an illegitimate user. Layer 3 (inner layer) uses the deep entropy based (DEB) scheme to identify, classify and mitigate high-rate DDoS (HR-DDoS) and flash crowd (FC) attacks. The research shows that in contrast to earlier studies, the structure of the proposed system offers effective defense against DoS/DDoS assaults for web applications.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 4; 77--82
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Implementation of Efficient Inline DDoS Detector Based on AATAC Algorithm
Autorzy:
Wiśniewski, Piotr
Sosnowski, Maciej
Burakowski, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/2200718.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
DDoS
Distributed Denial of Service
traffic anomaly detection
AATAC
performance
DPDK
Opis:
Distributed Denial of Service (DDoS) attacks constitute a major threat in the current Internet. These cyber-attacks aim to flood the target system with tailored malicious network traffic overwhelming its service capacity and consequently severely limiting legitimate users from using the service. This paper builds on the state-of-the-art AATAC algorithm (Autonomous Algorithm for Traffic Anomaly Detection) and provides a concept of a dedicated inline DDoS detector capable of real-time monitoring of network traffic and near-real-time anomaly detection. The inline DDoS detector consists of two main elements: 1) inline probe(s) responsible for link-rate real-time processing and monitoring of network traffic with custom-built packet feature counters, and 2) an analyser that performs the near-real-time statistical analysis of these counters for anomaly detection. These elements communicate asynchronously via the Redis database, facilitating a wide range of deployment scenarios. The inline probes are based on COTS servers and utilise the DPDK framework (Data Plane Development Kit) and parallel packet processing on multiple CPU cores to achieve link rate traffic analysis, including tailored DPI analysis.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 4; 889--898
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies