Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   6  
      Distributed Denial of Service AttackDDoSBotnetInternet Use
The essential services such as banking, transportation, medicine, education and defense are being progressively replaced by cheaper and more efficient Internet-based web applications. Therefore, the availability of Web services is very... more
    • by 
    •   14  
      Economic GrowthWeb ServicesTransportationDistributed Denial of Service Attack
    • by 
    •   7  
      Computer ScienceGame TheoryComputer NetworksDistributed Denial of Service Attack
    • by 
    •   7  
      Computer ScienceDistributed ComputingDistributed Denial of Service AttackAuthentication
Internet of things (IoT) means connecting things or electronic objects with each other or with their manufacturers sharing data and information. It can also be called a cloud which connects multiple devices and gathers information from... more
    • by 
    •   3  
      Distributed Denial of Service AttackMobile Ad hoc Networks, Denial of Service Attacks, Distributed DoSInternet of Things (IoTs)
Load balancing functionalities are crucial for best Grid performance and utilization. Accordingly,this paper presents a new meta-scheduling method called TunSys. It is inspired from the natural phenomenon of heat propagation and thermal... more
    • by 
    •   20  
      Computer ScienceAlgorithmsDistributed ComputingDistributed Database
Internet was designed for network services without any intention for secure communication. Exponential growth of internet and its users have developed an era of global competition and rivalry. Denial of service attack by multiple nodes is... more
    • by 
    •   18  
      Computer ScienceDistributed ComputingSecurityDistributed Denial of Service Attack
    • by 
    •   5  
      Information SocietyEconomic GrowthDistributed Denial of Service AttackInternet Architecture
    • by 
    •   10  
      Distributed Denial of Service AttackDDoSSCADANetwork monitoring
Mobile Ad Hoc networks (MANET) are resource constrained and operate on the basis of mutual cooperation. As a result, service discovery is one of the essential services of MANET. Service discovery was integrated onto Ad Hoc on Demand... more
    • by  and +1
    •   3  
      Mobile Ad Hoc NetworksDistributed Denial of Service AttackImproved Multicast AODV: A Review
In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance... more
    • by  and +1
    •   37  
      Relational DatabaseInformation SecurityInternational SecurityCritical Security Studies
To protect computer systems it is important to consider the concept of CIA: confidentiality, integrity and availability. With respect to availability, hackers continue to focus on preventing access to online services and systems by... more
    • by 
    •   8  
      Information SecurityDistributed Denial of Service AttackComputer HackingComputer Network
The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most... more
    • by 
    •   10  
      Machine LearningNetwork SecurityThe Internet of ThingsDistributed Denial of Service Attack
Among various cyber threats, a DDoS attack is one of the major Internet threats that can affect anyone and even cause tremendous financial damage to organization that uses cloud-based services, while the mitigation of this threat can be... more
    • by 
    •   48  
      Information SystemsComputer Security And ReliabilityInformation ScienceInformation Technology
    • by 
    •   180  
      Information SystemsElectronic EngineeringCommunication EngineeringSociology
    • by 
    •   12  
      EngineeringTechnologyNetwork SecurityComputer Networks
This is analysis of China’s “Great Cannon,” our term for an attack tool that we identify as separate from, but co-located with, the Great Firewall of China. The first known usage of the Great Cannon is in the recent large-scale novel DDoS... more
    • by 
    •   12  
      Internet SecurityDistributed Denial of Service AttackChinaChina Going Global
Smart city brings enormous opportunities and exciting challenges. In a smart city, operations and services such as traffic, transport, electric power, and water distribution are monitored, operated, and controlled through ICT based... more
    • by 
    •   10  
      Computer ScienceNetwork SecurityDistributed Denial of Service AttackSmart City
Cyber-deterrence has become a fashionable concept, and there has been a wealth of literature and polemic produced which seeks to simplify it, sell it as an applicable theory and fight for its insertion into national security strategies;... more
    • by 
    •   22  
      Computer ScienceInternational RelationsCybercrimesNetwork Security
With the increased dependence of organizations on technological solutions, the cyber threats have become some of the major concerns for the very existence of the businesses. Thus, the security measures to be implemented need to go beyond... more
    • by 
    •   45  
      Information SystemsComputer ScienceComputer Security And ReliabilityInformation Science
    • by 
    •   20  
      EngineeringComputer ScienceTechnologyInformation Security
    • by 
    •   7  
      Computer ScienceInformation SecurityNetwork SecurityComputer Networks
    • by 
    •   10  
      Business NetworksDistributed Denial of Service AttackCloud ComputingKnowledge Based System
Denial-of-Service (DoS) is a network security problem that constitutes a serious challenge to reliability of services deployed on the servers. The aim of DoS attacks is to exhaust a resource in the target system, reducing or completely... more
    • by 
    •   3  
      Distributed Denial of Service AttackDenial of ServiceIptables
Over recent years, we have observed a significant increase in the number and the sophistication of cyber attacks targeting home users, businesses, government organizations and even critical infrastructure. In many cases, it is important... more
    • by 
    •   5  
      Distributed Denial of Service AttackIntrusion Detection SystemsAnomaly DetectionNetwork Intrusion Detection & Prevention
In past decade, traditional network was used for transferring of data between nodes. The main issue related to traditional networks was their stable nature and also, they were unable to meet the requirements of newly added devices in the... more
    • by 
    •   11  
      Machine LearningDistributed Denial of Service AttackRandom ForestDecision Tree
    • by 
    •   14  
      EngineeringTechnologySignal ProcessingNetwork Security
    • by 
    •   32  
      Distributed ComputingInformation TheoryInternet SecurityDistributed Denial of Service Attack
    • by 
    •   9  
      Servers (Computer Science)Network SecurityComputer NetworksDistributed Denial of Service Attack
This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of Information Theory, specifically Kolmogorov Complexity. A theorem derived using principles of Kolmogorov... more
    • by 
    •   32  
      Distributed ComputingInformation TheoryInternet SecurityDistributed Denial of Service Attack
    • by 
    •   11  
      Data MiningWeb MiningDistributed Denial of Service AttackFeature Selection
    • by 
    •   5  
      Distributed ComputingDistributed Denial of Service AttackComputer Softwarecomputer Communication
    • by 
    • Distributed Denial of Service Attack
This intrusion detection mechanism examines the traffic in real-time environment to resolve if someone is sending malicious traffic or attacks on the cloud infrastructure. In this research work, a novel attack detection system called... more
    • by 
    •   8  
      Computer ScienceInformation SecurityNetwork SecurityComputer Networks
    • by 
    •   10  
      Distributed Denial of Service AttackDDoSSCADANetwork monitoring
The objective of the study is to design a heuristic supervised learning algorithm, that locates Intrusion and improves performance of network. In this paper we have proposed the algorithm using existing supervised learning approach and... more
    • by  and +1
    •   4  
      Distributed Denial of Service AttackIntrusion Detection SystemsWireless Sensor and Mobile Adhoc NetworksMobile Ad hoc Networks, Denial of Service Attacks, Distributed DoS
    • by 
    •   8  
      Distributed Denial of Service AttackForgeryCyber StalkingOnline Gambling
Conventional network intrusion detection systems (NIDS) have heavyweight processing and memory requirements as they maintain per flow state using data structures such as linked lists or trees. This is required for some specialized jobs... more
    • by 
    •   7  
      Distributed Denial of Service AttackDistributed Estimation and detectionData StructureBloom Filter
    • by 
    •   6  
      Social NetworkingNetwork SecurityDistributed Denial of Service AttackDDoS
Convergence and ubiquity are the key characteristics of tomorrows service provision infrastructures. Cloud architectures will constitute cost-efficient backbones that will support the transmission, storage, and computing of the... more
    • by 
    •   27  
      Ubiquitous ComputingSecurity in Web ServicesDistributed Denial of Service AttackTesting
Software Defined Networking (SDN) has emerged as a new networking paradigm for managing different kinds of networks ranging from enterprise to home network through software enabled control. The logically centralized control plane and... more
    • by 
    •   5  
      Distributed Denial of Service AttackCyber SecuritySoftware Defined Networks (SDN)Networks Functions Virtualisation (NFV)
    • by 
    •   3  
      Distributed Denial of Service AttackDDOS AttackDenial of Service Attack
    • by 
    •   9  
      Distributed Denial of Service AttackFloodingScale free networkTraffic Shaping
Conventional network intrusion detection systems (NIDS) have heavyweight processing and memory requirements as they maintain per flow state using data structures such as linked lists or trees. This is required for some specialized jobs... more
    • by 
    •   7  
      Distributed Denial of Service AttackDistributed Estimation and detectionData StructureBloom Filter
We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture. It is simple, efficient, and secure; we sketch a proof of the latter property. JFK also has a number of novel... more
    • by 
    •   12  
      Information SystemsComputer ScienceDistributed Denial of Service AttackCryptography
Cloud computing is not a new technology; it is a new way of delivering computing resources. Elastic cloud computing enables services to be deployed and accessed globally on demand with little maintenance by providing QoS as per service... more
    • by 
    •   6  
      Network SecurityDistributed Denial of Service AttackCloud Computing=> Identity and Cloud => Identity and Access Management => Security Consulting => Identity as a Service (IDaaS) => Privacy
    • by 
    •   18  
      ForensicsMachine LearningData MiningPervasive Computing
    • by 
    •   13  
      Distributed ComputingDistributed Denial of Service AttackPacket SwitchingCryptography
Denial of Service attack is one of the most talked about phenomenon in Internet security domain This attacks are meant to make a victim’s system’s resource such as network bandwidth or cpu unavailable to serve it purpose .Origin of... more
    • by 
    •   3  
      Computer NetworksDistributed Denial of Service AttackDenial of Service