Academic literature on the topic 'Application layer DDoS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Application layer DDoS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Application layer DDoS"
Xie, Bailin, Yu Wang, Guogui Wen, and Xiaojun Xu. "Application-Layer DDoS Attack Detection Using Explicit Duration Recurrent Network-Based Application-Layer Protocol Communication Models." International Journal of Intelligent Systems 2023 (June 17, 2023): 1–13. http://dx.doi.org/10.1155/2023/2632678.
Full textRavichandran, S., and M. Umamaheswari. "Design and Development of Collaborative Detection and Taxonomy of DDoS Attacks Using ESVM." Asian Journal of Computer Science and Technology 6, no. 2 (2017): 27–32. http://dx.doi.org/10.51983/ajcst-2017.6.2.1783.
Full textBeitollahi, Hakem, and Geert Deconinck. "Tackling Application-layer DDoS Attacks." Procedia Computer Science 10 (2012): 432–41. http://dx.doi.org/10.1016/j.procs.2012.06.056.
Full textDi, Xiao Qiang, Hua Min Yang, and Hui Qi. "Low-Rate Application-Layer DDoS Attacks Detection by Principal Component Analysis (PCA) through User Browsing Behavior." Applied Mechanics and Materials 397-400 (September 2013): 1945–48. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1945.
Full textRanjan, S., R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly. "DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks." IEEE/ACM Transactions on Networking 17, no. 1 (2009): 26–39. http://dx.doi.org/10.1109/tnet.2008.926503.
Full textP., Ashvini, Anushree P., Bhagyashree N., Kiran S., and K. S. Kumavat. "DDOS Attack Prevention on Application Layer." International Journal of Computer Applications 127, no. 10 (2015): 22–25. http://dx.doi.org/10.5120/ijca2015906509.
Full textZeebaree, Subhi R. M., Karzan H. Sharif, and Roshna M. Mohammed Amin. "Application Layer Distributed Denial of Service Attacks Defense Techniques : A review." Academic Journal of Nawroz University 7, no. 4 (2018): 113. http://dx.doi.org/10.25007/ajnu.v7n4a279.
Full textKareem, Morenikeji Kabirat, Olaniyi Dada Aborisade, Saidat Adebukola Onashoga, Tole Sutikno, and Olaniyi Mathew Olayiwola. "Efficient model for detecting application layer distributed denial of service attacks." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 441–50. http://dx.doi.org/10.11591/eei.v12i1.3871.
Full textNi, Tongguang, Xiaoqing Gu, Hongyuan Wang, and Yu Li. "Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis." Journal of Control Science and Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/821315.
Full textRahmad, Gunawan, Ab Ghani Hadhrami, Khamis Nurulaqilla, Al Amien Januar, and Ismanto Edi. "Deep learning approach to DDoS attack with imbalanced data at the application layer." TELKOMNIKA 21, no. 05 (2023): 1060–67. https://doi.org/10.12928/telkomnika.v21i5.24857.
Full textDissertations / Theses on the topic "Application layer DDoS"
Mekhitarian, Araxi, and Amir Rabiee. "A simulation study of an application layer DDoS detection mechanism." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191145.
Full textJawad, Dina, and Felicia Rosell. "Speak-up as a Resource Based Defence against Application Layer Distributed Denial-of-Service Attacks." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166597.
Full textLee, Ming-fang, and 李明舫. "A Framework for Defending Application Layer DDoS Attacks Using a Back-Propagation Neural Network." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/46135312237380714209.
Full textBook chapters on the topic "Application layer DDoS"
Sreenivasarao, Sadhu. "Application Layer DDOS Attack Detection and Defense Methods." In Proceedings of Emerging Trends and Technologies on Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3097-2_1.
Full textYu, Jie, Chengfang Fang, Liming Lu, and Zhoujun Li. "A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10485-5_13.
Full textMohamed, Mohamed Aly, and Nashwa Abdelbaki. "HTTP Application Layer DDoS Attack Mitigation Using Resources Monitor." In Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64861-3_20.
Full textBrown, Eric, John Fisher, Aaron Hudon, Erick Colston, and Wei Lu. "Multiclassification Analysis of Volumetric, Protocol, and Application Layer DDoS Attacks." In Advanced Information Networking and Applications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57942-4_39.
Full textYe, Xi, Wushao Wen, Yiru Ye, and Qin Cen. "An OTP-Based Mechanism for Defending Application Layer DDoS Attacks." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23226-8_51.
Full textMiu, TungNgai, Chenxu Wang, Daniel Xiapu Luo, and Jinhe Wang. "Modeling User Browsing Activity for Application Layer DDoS Attack Detection." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59608-2_42.
Full textSharma, Ankita, and Anshu Bhasin. "Critical Investigation on Application Layer-DDoS Attacks: Taxonomy and Parameter Efficacy." In Proceedings of ICETIT 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30577-2_82.
Full textZolotukhin, Mikhail, and Timo Hämäläinen. "Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic." In Cyber Security: Power and Technology. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_8.
Full textZhang, Mi, Wei Zhang, and Kuan Fan. "Application Layer DDoS Detection Model Based on Data Flow Aggregation and Evaluation." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31968-6_5.
Full textChinnaiah, Balarengadurai. "Protection of DDoS Attacks at the Application Layer: HyperLogLog (HLL) Cardinality Estimation." In Cognitive Informatics and Soft Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1056-1_46.
Full textConference papers on the topic "Application layer DDoS"
Sharif, Dyari Mohammed. "High-Accurate Application-Layer DDoS Attack Detection Using Machine Learning." In 2023 International Conference on Engineering Applied and Nano Sciences (ICEANS). IEEE, 2023. http://dx.doi.org/10.1109/iceans58413.2023.10629670.
Full textSharif, Dyari Mohammed. "Application-Layer DDoS Detection via Efficient Machine Learning and Feature Selection." In 2023 International Conference on Engineering Applied and Nano Sciences (ICEANS). IEEE, 2023. http://dx.doi.org/10.1109/iceans58413.2023.10630487.
Full textSuman, Padmavathy S, M. Madiajagan, B. J. Job Karuna Sagar, S. Selvi, and Charanjeet Singh. "Detecting Transport and Application Layer DDos Attacks in IoT Devices with Machine and Deep Learning." In 2024 International Conference on Communication, Computing and Energy Efficient Technologies (I3CEET). IEEE, 2024. https://doi.org/10.1109/i3ceet61722.2024.10993831.
Full textYe, Chengxu, Kesong Zheng, and Chuyu She. "Application layer ddos detection using clustering analysis." In 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2012. http://dx.doi.org/10.1109/iccsnt.2012.6526103.
Full textSingh, Barjinder, Krishan Kumar, and Abhinav Bhandari. "Simulation study of application layer DDoS attack." In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015. http://dx.doi.org/10.1109/icgciot.2015.7380589.
Full textFeng, Yebo, Jun Li, and Thanh Nguyen. "Application-Layer DDoS Defense with Reinforcement Learning." In 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS). IEEE, 2020. http://dx.doi.org/10.1109/iwqos49365.2020.9213026.
Full textShe, Chuyu, Wushao Wen, Zaihua Lin, and Kesong Zheng. "Detection of Application-Layer DDoS by Clustering Algorithm." In 2016 2nd International Conference on Artificial Intelligence and Industrial Engineering (AIIE 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/aiie-16.2016.25.
Full textDantas, Yuri Gil, Vivek Nigam, and Iguatemi E. Fonseca. "A Selective Defense for Application Layer DDoS Attacks." In 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC). IEEE, 2014. http://dx.doi.org/10.1109/jisic.2014.21.
Full textCirillo, Michele, Mario Di Mauro, Vincenzo Matta, and Marco Tambasco. "Application-Layer DDOS Attacks with Multiple Emulation Dictionaries." In ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2021. http://dx.doi.org/10.1109/icassp39728.2021.9413570.
Full textShe, Chuyu, Wushao Wen, Kesong Zheng, and Yayun Lyu. "Application-Layer DDoS Detection by K-means Algorithm." In 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/iceeecs-16.2016.16.
Full text