Journal articles on the topic 'Application layer DDoS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Application layer DDoS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Xie, Bailin, Yu Wang, Guogui Wen, and Xiaojun Xu. "Application-Layer DDoS Attack Detection Using Explicit Duration Recurrent Network-Based Application-Layer Protocol Communication Models." International Journal of Intelligent Systems 2023 (June 17, 2023): 1–13. http://dx.doi.org/10.1155/2023/2632678.
Full textRavichandran, S., and M. Umamaheswari. "Design and Development of Collaborative Detection and Taxonomy of DDoS Attacks Using ESVM." Asian Journal of Computer Science and Technology 6, no. 2 (2017): 27–32. http://dx.doi.org/10.51983/ajcst-2017.6.2.1783.
Full textBeitollahi, Hakem, and Geert Deconinck. "Tackling Application-layer DDoS Attacks." Procedia Computer Science 10 (2012): 432–41. http://dx.doi.org/10.1016/j.procs.2012.06.056.
Full textDi, Xiao Qiang, Hua Min Yang, and Hui Qi. "Low-Rate Application-Layer DDoS Attacks Detection by Principal Component Analysis (PCA) through User Browsing Behavior." Applied Mechanics and Materials 397-400 (September 2013): 1945–48. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1945.
Full textRanjan, S., R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly. "DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks." IEEE/ACM Transactions on Networking 17, no. 1 (2009): 26–39. http://dx.doi.org/10.1109/tnet.2008.926503.
Full textP., Ashvini, Anushree P., Bhagyashree N., Kiran S., and K. S. Kumavat. "DDOS Attack Prevention on Application Layer." International Journal of Computer Applications 127, no. 10 (2015): 22–25. http://dx.doi.org/10.5120/ijca2015906509.
Full textZeebaree, Subhi R. M., Karzan H. Sharif, and Roshna M. Mohammed Amin. "Application Layer Distributed Denial of Service Attacks Defense Techniques : A review." Academic Journal of Nawroz University 7, no. 4 (2018): 113. http://dx.doi.org/10.25007/ajnu.v7n4a279.
Full textKareem, Morenikeji Kabirat, Olaniyi Dada Aborisade, Saidat Adebukola Onashoga, Tole Sutikno, and Olaniyi Mathew Olayiwola. "Efficient model for detecting application layer distributed denial of service attacks." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 441–50. http://dx.doi.org/10.11591/eei.v12i1.3871.
Full textNi, Tongguang, Xiaoqing Gu, Hongyuan Wang, and Yu Li. "Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis." Journal of Control Science and Engineering 2013 (2013): 1–6. http://dx.doi.org/10.1155/2013/821315.
Full textRahmad, Gunawan, Ab Ghani Hadhrami, Khamis Nurulaqilla, Al Amien Januar, and Ismanto Edi. "Deep learning approach to DDoS attack with imbalanced data at the application layer." TELKOMNIKA 21, no. 05 (2023): 1060–67. https://doi.org/10.12928/telkomnika.v21i5.24857.
Full textEl-Sofany, Hosam F., and Samir Abou El-Seoud. "Performance Analysis of an Effective Approach to Protect Cloud Systems against Application Layer Based Attacks." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 03 (2019): 82. http://dx.doi.org/10.3991/ijoe.v15i03.9931.
Full textYalgʻashov, Anvar Ikrom oʻgʻli Fayzullayev Ikrom Yusub o'g'li Norqobilov Sobir Hamza o'g'li. "DDOS ATTACKS AND PROTECTION AGAINST THEM." EURASIAN JOURNAL OF ACADEMIC RESEARCH 2, no. 13 (2022): 1009–12. https://doi.org/10.5281/zenodo.7476343.
Full textLAKSHMI TEJASWI, Mrs LINGAREDDY, and Mr VELPULA RAJU. "Detection of Application Layer DDOS-Attacks Produced by Various Freely Accessible Toolkits Using Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–15. http://dx.doi.org/10.55041/ijsrem37080.
Full textKanber, Bassam M., Naglaa F. Noaman, Amr M. H. Saeed, and Mansoor Malas. "DDoS Attacks Detection in the Application Layer Using Three Level Machine Learning Classification Architecture." International Journal of Computer Network and Information Security 14, no. 3 (2022): 33–46. http://dx.doi.org/10.5815/ijcnis.2022.03.03.
Full textZhao, Xiaolin, Hui Peng, Xiang Li, et al. "Defending Application Layer DDoS Attacks via Multidimensional Parallelotope." Security and Communication Networks 2020 (December 30, 2020): 1–11. http://dx.doi.org/10.1155/2020/6679304.
Full textKravchuk, Arkadii, and Mykola Onai. "Developing information technology for evaluating and enhancing application-layer DDoS attack detection methods." Radioelectronic and Computer Systems 2024, no. 3 (2024): 132–55. http://dx.doi.org/10.32620/reks.2024.3.09.
Full textAsad, Muhammad, Muhammad Asim, Talha Javed, Mirza O. Beg, Hasan Mujtaba, and Sohail Abbas. "DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning." Computer Journal 63, no. 7 (2019): 983–94. http://dx.doi.org/10.1093/comjnl/bxz064.
Full textAbdullayeva, Fargana J. "Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–15. http://dx.doi.org/10.4018/ijcwt.305242.
Full textTennakoon, Chaminda, and Subha Fernando. "Deep learning model for distributed denial of service (DDoS) detection." International Journal of ADVANCED AND APPLIED SCIENCES 9, no. 2 (2022): 109–18. http://dx.doi.org/10.21833/ijaas.2022.02.012.
Full textJaafar, Abdul Ghafar, Saiful Adli Ismail, Mohd Shahidan Abdullah, Nazri Kama, Azri Azmi, and Othman Mohd Yusop. "Recent Analysis of Forged Request Headers Constituted by HTTP DDoS." Sensors 20, no. 14 (2020): 3820. http://dx.doi.org/10.3390/s20143820.
Full textResearcher. "AN ARCHITECTURE FOR A DISTRIBUTED CLOUD HONEYPOT." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 488–500. https://doi.org/10.5281/zenodo.14183575.
Full textDawadi, Babu R., Bibek Adhikari, and Devesh K. Srivastava. "Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks." Sensors 23, no. 4 (2023): 2073. http://dx.doi.org/10.3390/s23042073.
Full textZhao, Yuntao, Wenbo Zhang, Yongxin Feng, and Bo Yu. "A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack." Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9463653.
Full textAhmed, Sheeraz, Zahoor Ali Khan, Syed Muhammad Mohsin, et al. "Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron." Future Internet 15, no. 2 (2023): 76. http://dx.doi.org/10.3390/fi15020076.
Full textBravo, Silvia, and David Mauricio. "New Features of User’s Behavior to Distributed Denial of Service Attacks Detection in Application Layer." International Journal of Online and Biomedical Engineering (iJOE) 14, no. 12 (2018): 164. http://dx.doi.org/10.3991/ijoe.v14i12.9439.
Full textKalutharage, Chathuranga Sampath, Xiaodong Liu, Christos Chrysoulas, Nikolaos Pitropakis, and Pavlos Papadopoulos. "Explainable AI-Based DDOS Attack Identification Method for IoT Networks." Computers 12, no. 2 (2023): 32. http://dx.doi.org/10.3390/computers12020032.
Full textYu, Xiang, Wenchao Yu, Shudong Li, Xianfei Yang, Ying Chen, and Hui Lu. "WEB DDoS Attack Detection Method Based on Semisupervised Learning." Security and Communication Networks 2021 (November 29, 2021): 1–10. http://dx.doi.org/10.1155/2021/9534016.
Full textReddy, R. Obulakonda, R. Nagarjuna Reddy, M. Radha, N. Sree Vani, and B. Srinivasulu. "Observing the Application-Layer DDoS Attacks for Prevalent Websites." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 6 (2017): 821–27. http://dx.doi.org/10.23956/ijarcsse/v7i6/0344.
Full textSree, T. Raja, and S. Mary Saira Bhanu. "Investigation of Application Layer DDoS Attacks Using Clustering Techniques." International Journal of Wireless and Microwave Technologies 8, no. 3 (2018): 1–13. http://dx.doi.org/10.5815/ijwmt.2018.03.01.
Full textYi Xie and Shun-Zheng Yu. "Monitoring the Application-Layer DDoS Attacks for Popular Websites." IEEE/ACM Transactions on Networking 17, no. 1 (2009): 15–25. http://dx.doi.org/10.1109/tnet.2008.925628.
Full textRenuka Devi, s. "A Hybrid Approach to Counter Application Layer DDOS Attacks." International Journal on Cryptography and Information Security 2, no. 2 (2012): 45–52. http://dx.doi.org/10.5121/ijcis.2012.2204.
Full textPraseed, Amit, and P. Santhi Thilagam. "Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection." IEEE Transactions on Information Forensics and Security 16 (2021): 617–26. http://dx.doi.org/10.1109/tifs.2020.3017928.
Full textPriya M R, Usha J. "A Study on DDoS Attack Detection Technique Prior to Machine Learning in Wireless Sensor Networks." Tuijin Jishu/Journal of Propulsion Technology 44, no. 5 (2023): 3698–721. http://dx.doi.org/10.52783/tjjpt.v44.i5.3458.
Full textSelvakani, S., K. Vasumathi, T. Vijayalakshmi, and A. Kavitha. "Attack in SDN Based Distributed Denial of Service." Asian Journal of Engineering and Applied Technology 10, no. 1 (2021): 38–44. http://dx.doi.org/10.51983/ajeat-2021.10.1.2802.
Full textSharma, Amit. "HULK and DDoS Attacks in Web Applications with Detection Mechanism." International Journal of Emerging Research in Management and Technology 6, no. 6 (2018): 192. http://dx.doi.org/10.23956/ijermt.v6i6.268.
Full textAlmeghlef, Sultan M., Abdullah AL-Malaise AL-Ghamdi, Muhammad Sher Ramzan, and Mahmoud Ragab. "Application Layer-Based Denial-of-Service Attacks Detection against IoT-CoAP." Electronics 12, no. 12 (2023): 2563. http://dx.doi.org/10.3390/electronics12122563.
Full textLi, Jin Ling, and Bin Qiang Wang. "Detecting App-DDoS Attacks Based on Marking Access and d-SVDD." Applied Mechanics and Materials 347-350 (August 2013): 3734–39. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3734.
Full textSambangi, Swathi, and Lakshmeeswari Gondi. "A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression." Proceedings 63, no. 1 (2020): 51. http://dx.doi.org/10.3390/proceedings2020063051.
Full textYe, Xi, Wu Shao Wen, and Yi Ru Ye. "A Defensive OTP-Based Mechanism against Application Layer DDoS Attacks." Key Engineering Materials 480-481 (June 2011): 769–74. http://dx.doi.org/10.4028/www.scientific.net/kem.480-481.769.
Full textTsien, Yu Lei, and Rong Li Gai. "User Activity Based Application-Layer DoS/DDoS Attack Defense Algorithm." Applied Mechanics and Materials 742 (March 2015): 693–97. http://dx.doi.org/10.4028/www.scientific.net/amm.742.693.
Full textSinghal, Sunita, Paul Agostinho Medeira, Parth Singhal, and Moin Khorajiya. "Detection of application layer DDoS attacks using big data technologies." Journal of Discrete Mathematical Sciences and Cryptography 23, no. 2 (2020): 563–71. http://dx.doi.org/10.1080/09720529.2020.1729505.
Full textA. Siva, Kumar, and Karthik M.Ganesh. "A Prevention Approach to Counter DDoS Attacks in Application Layer." i-manager's Journal on Information Technology 5, no. 3 (2016): 13. http://dx.doi.org/10.26634/jit.5.3.8136.
Full textRahman, Rizwan ur, Deepak Singh Tomar, and Jijin A.V. "Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach." International Journal of Security and Its Applications 11, no. 4 (2017): 85–96. http://dx.doi.org/10.14257/ijsia.2017.11.4.07.
Full textLin, Huan, Shoufeng Cao, Jiayan Wu, Zhenzhong Cao, and Fengyu Wang. "Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices." IEEE Access 7 (2019): 164480–91. http://dx.doi.org/10.1109/access.2019.2950820.
Full textSingh, Khundrakpam Johnson, and Tanmay De. "MLP-GA based algorithm to detect application layer DDoS attack." Journal of Information Security and Applications 36 (October 2017): 145–53. http://dx.doi.org/10.1016/j.jisa.2017.09.004.
Full textBeitollahi, Hakem, and Geert Deconinck. "ConnectionScore: a statistical technique to resist application-layer DDoS attacks." Journal of Ambient Intelligence and Humanized Computing 5, no. 3 (2013): 425–42. http://dx.doi.org/10.1007/s12652-013-0196-5.
Full textAli, Omar Mohammed Amin, Rebin Abdulkareem Hamaamin, Barzan Jalal Youns, and Shahab Wahhab Kareem. "Innovative Machine Learning Strategies for DDoS Detection: A Review." UHD Journal of Science and Technology 8, no. 2 (2024): 38–49. http://dx.doi.org/10.21928/uhdjst.v8n2y2024.pp38-49.
Full textGU, Xiaoqing, Hongyuan WANG, Tongguang NI, and Hui DING. "Detection of application-layer DDoS attack based on time series analysis." Journal of Computer Applications 33, no. 8 (2013): 2228–31. http://dx.doi.org/10.3724/sp.j.1087.2013.02228.
Full textNashat, Dalia, S. Khairy, and Montaser M. Hassan. "Detection of Application Layer DDoS Attack Based on SIS Epidemic Model." IEEE Access 9 (2021): 159827–32. http://dx.doi.org/10.1109/access.2021.3132130.
Full textSingh, Karanpreet, Paramvir Singh, and Krishan Kumar. "Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges." Computers & Security 65 (March 2017): 344–72. http://dx.doi.org/10.1016/j.cose.2016.10.005.
Full text