Journal articles on the topic 'Data flooding attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data flooding attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Saragih, Naikson, Ridho Agus Wery Nanda Panjaitan, and Mufria Jonatan Purba. "FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS." Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) 6, no. 2 (2023): 28–34. http://dx.doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932.
Full textLiu, Liang, Weiqing Yu, Zhijun Wu, and Silin Peng. "XGBoost-Based Detection of DDoS Attacks in Named Data Networking." Future Internet 17, no. 5 (2025): 206. https://doi.org/10.3390/fi17050206.
Full textZhang, Li Cui, Zhi Gang Wang, Tao Wang, Yong Shi Sun, and Xiao Fei Xu. "Research of Secure Scheme against Data Flooding Attack in Ad Hoc Networks." Advanced Materials Research 204-210 (February 2011): 395–99. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.395.
Full textBaldev Singh, Dr, Dr S.N. Panda, and Dr Gurpinder Singh Samra. "Slow flooding attack detection in cloud using change point detection approach." International Journal of Engineering & Technology 7, no. 2.30 (2018): 33. http://dx.doi.org/10.14419/ijet.v7i2.30.13459.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textLuong, Ngoc T., Tu T. Vo, and Doan Hoang. "FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2019 (January 10, 2019): 1–17. http://dx.doi.org/10.1155/2019/6869307.
Full textAnugrah, Ino, and Raden Hengki Rahmanto. "Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 5, no. 2 (2018): 91–106. http://dx.doi.org/10.33558/piksel.v5i2.271.
Full textL, Sheeba, and Meenakshi V S. "“HYBRID NODE WATCHING TECHNIQUE BASED DOS FLOODING ATTACK DETECTION IN WIRELESS SENSOR NETWORK." ICTACT Journal on Communication Technology 11, no. 4 (2020): 2292–300. https://doi.org/10.21917/ijct.2020.0339.
Full textLiu, Susu, Xun Liao, and Heyuan Shi. "A PSO-SVM for Burst Header Packet Flooding Attacks Detection in Optical Burst Switching Networks." Photonics 8, no. 12 (2021): 555. http://dx.doi.org/10.3390/photonics8120555.
Full textS, Nithish Babu, Yogesh V, Mariswaran S, and Gowtham N. "Detection of DDOS Attack using Decision Tree Classifier in SDN Environment." Journal of Ubiquitous Computing and Communication Technologies 5, no. 2 (2023): 193–202. http://dx.doi.org/10.36548/jucct.2023.2.006.
Full textDhanapal A and Nithyanandam P. "The HTTP Flooding Attack Detection to Secure and Safeguard Online Applications in the Cloud." International Journal of Information System Modeling and Design 10, no. 3 (2019): 41–58. http://dx.doi.org/10.4018/ijismd.2019070103.
Full textYunus, Warid, and Mohamad Efendi Lasulika. "Security System Analysis against Flood Attacks Using TCP, UDP, and ICMP Protocols on Mikrotik Routers." International Journal of Advances in Data and Information Systems 3, no. 1 (2022): 11–19. http://dx.doi.org/10.25008/ijadis.v3i1.1231.
Full textWang, Licheng, Yun Pan, Mianxiong Dong, Yafang Yu, and Kun Wang. "Economic Levers for Mitigating Interest Flooding Attack in Named Data Networking." Mathematical Problems in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/4541975.
Full textHan, Yu, Liumei Zhang, Yichuan Wang, Xi Deng, Zhendong Gu, and Xiaohui Zhang. "Research on the Security of IPv6 Communication Based on Petri Net under IoT." Sensors 23, no. 11 (2023): 5192. http://dx.doi.org/10.3390/s23115192.
Full textMink, Dustin M., Jeffrey McDonald, Sikha Bagui, et al. "Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B." Big Data and Cognitive Computing 5, no. 2 (2021): 27. http://dx.doi.org/10.3390/bdcc5020027.
Full textSaputra, Aldi Sigit, and Dadan Irwan. "Sistem Keamanan Pada Jaringan Wireless Menggunakan Protokol RADIUS." JUSS (Jurnal Sains dan Sistem Informasi) 3, no. 2 (2020): 28–34. http://dx.doi.org/10.22437/juss.v3i2.10884.
Full textZhang, Xin, Ru Li, and Wenhan Hou. "Attention-Based LSTM Model for IFA Detection in Named Data Networking." Security and Communication Networks 2022 (July 21, 2022): 1–14. http://dx.doi.org/10.1155/2022/1812273.
Full textRahmad, Gunawan, Ab Ghani Hadhrami, Khamis Nurulaqilla, Al Amien Januar, and Ismanto Edi. "Deep learning approach to DDoS attack with imbalanced data at the application layer." TELKOMNIKA 21, no. 05 (2023): 1060–67. https://doi.org/10.12928/telkomnika.v21i5.24857.
Full textAbdullah, Muhammad, Imran Raza, Tanveer Zia, and Syed Asad Hussain. "Interest flooding attack mitigation in a vehicular named data network." IET Intelligent Transport Systems 15, no. 4 (2021): 525–37. http://dx.doi.org/10.1049/itr2.12042.
Full textMagsi, Arif Hussain, Syed Agha Hassnain Mohsan, Ghulam Muhammad, and Suhni Abbasi. "A Machine Learning-Based Interest Flooding Attack Detection System in Vehicular Named Data Networking." Electronics 12, no. 18 (2023): 3870. http://dx.doi.org/10.3390/electronics12183870.
Full textVivek Sharma. "Impact of RREQ Packet Flooding Attack on Wireless Sensor Networks: A Simulation-Based Study." Communications on Applied Nonlinear Analysis 31, no. 2s (2024): 277–86. http://dx.doi.org/10.52783/cana.v31.645.
Full textArif Wirawan Muhammad, Muhammad Nur Faiz, and Ummi Athiyah. "Pengembangan Perangkat Lunak Untuk Deteksi DDoS Berbasis Neural Network." Infotekmesin 13, no. 2 (2022): 301–7. http://dx.doi.org/10.35970/infotekmesin.v13i2.1544.
Full textS.Kalai vani, Y., and Dr P.Ranjana. "Anomaly Detection in Distributed Denial of Service Attack using Map Reduce Improvised counter-based algorithm in Hadoop." International Journal of Engineering & Technology 7, no. 4.36 (2018): 390. http://dx.doi.org/10.14419/ijet.v7i4.36.23811.
Full textAlhammadi, Nafea A. Majeed, Mohamed Mabrouk, and Mounir Zrigui. "Recent Trends on Sophisticated types of Flooding Attacks and Detection Methods based on Multi Sensors Fusion Data for Cloud Computing Systems." Fusion: Practice and Applications 11, no. 1 (2023): 37–56. http://dx.doi.org/10.54216/fpa.110103.
Full textAlmaslukh, Bandar. "An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks." Security and Communication Networks 2020 (August 5, 2020): 1–11. http://dx.doi.org/10.1155/2020/8840058.
Full textBi, Jia Na, and E. Xu. "A Secure and Energy-Efficient Rooting Protocol for WSN." Applied Mechanics and Materials 347-350 (August 2013): 1699–704. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1699.
Full textAzis, Muhammad Misbahul, Yufiz Azhar, and Syaifuddin Syaifuddin. "Analisa Sistem Identifikasi DDoS Menggunakan KNN Pada Jaringan Software Defined Network(SDN)." Jurnal Repositor 2, no. 7 (2020): 915. http://dx.doi.org/10.22219/repositor.v2i7.762.
Full textP. Narode, Miss Priyanka, and Prof I. R. Shaikh. "Review on EM-CURE Algorithm for Detection DDOS Attack." International Journal Of Engineering And Computer Science 7, no. 01 (2018): 23386–489. http://dx.doi.org/10.18535/ijecs/v7i1.04.
Full textVerma, Priyanka, Shashikala Tapaswi, and W. Wilfred Godfrey. "An Impact Analysis and Detection of HTTP Flooding Attack in Cloud Using Bio-Inspired Clustering Approach." International Journal of Swarm Intelligence Research 12, no. 1 (2021): 29–49. http://dx.doi.org/10.4018/ijsir.2021010103.
Full textRao T, Srinivasa, Harsha G, Kiran V, and Hemanth Kumar K. "Dos flooding attack control in information-centric networks." International Journal of Engineering & Technology 7, no. 1.1 (2017): 303. http://dx.doi.org/10.14419/ijet.v7i1.1.9708.
Full textRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Full textXu, Yabin, Peiyuan Gu, and Xiaowei Xu. "Research on Detection Method of Interest Flooding Attack in Named Data Networking." Intelligent Automation & Soft Computing 29, no. 3 (2021): 113–27. http://dx.doi.org/10.32604/iasc.2021.018895.
Full textWu, Zhijun, Wenzhi Feng, Jin Lei, and Meng Yue. "I-CIFA: An improved collusive interest flooding attack in named data networking." Journal of Information Security and Applications 61 (September 2021): 102912. http://dx.doi.org/10.1016/j.jisa.2021.102912.
Full textAkinsolu, Mobayode O., Abimbola O. Sangodoyin, and Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis." Mathematics 10, no. 14 (2022): 2536. http://dx.doi.org/10.3390/math10142536.
Full textKurniawan, Andre Arta, Jusak, and Musayyanah. "Intrusion Detection System Using Deep Learning for DoS Attack Detection." JEECS (Journal of Electrical Engineering and Computer Sciences) 6, no. 2 (2021): 1087–98. http://dx.doi.org/10.54732/jeecs.v6i2.203.
Full textTun, Thazin. "A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark." Transactions on Networks and Communications 8, no. 3 (2020): 08–15. http://dx.doi.org/10.14738/tnc.83.8250.
Full textKhan, Inam Ullah, Asrin Abdollahi, Ryan Alturki, et al. "Intelligent Detection System Enabled Attack Probability Using Markov Chain in Aerial Networks." Wireless Communications and Mobile Computing 2021 (September 9, 2021): 1–9. http://dx.doi.org/10.1155/2021/1542657.
Full textPradhana, Ilman, Imam Riadi, and Yudi Prayudi. "Forensik Router untuk Mendeteksi Flooding Attack Menggunakan Metode Live Forensic." JRST (Jurnal Riset Sains dan Teknologi) 5, no. 1 (2021): 31. http://dx.doi.org/10.30595/jrst.v5i1.7662.
Full textNguyen, Tan, Hoang-Long Mai, Remi Cogranne, et al. "Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking." IEEE Transactions on Information Forensics and Security 14, no. 9 (2019): 2470–85. http://dx.doi.org/10.1109/tifs.2019.2899247.
Full textGanpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.
Full textP. Arul, Et al. "Predicting the Attacks in IoT Devices using DP Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (2023): 164–68. http://dx.doi.org/10.17762/ijritcc.v11i11.9133.
Full textWarcita, Kurniabudi, and Eko Arip Winanto. "Detection of UDP Flooding DDoS Attacks on IoT Networks Using Recurrent Neural Network." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 13, no. 3 (2024): 471–81. https://doi.org/10.23887/janapati.v13i3.79601.
Full textOussama, Sbai, and Elboukhari Mohamed. "Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks." International Journal of Artificial Intelligence (IJ-AI) 11, no. 3 (2022): 878–85. https://doi.org/10.11591/ijai.v11.i3.pp878-885.
Full textXu, Ziyi. "Deep Learning Based DDoS Attack Detection." ITM Web of Conferences 70 (2025): 03005. https://doi.org/10.1051/itmconf/20257003005.
Full textBaba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Full textSaurabh Kansal. "DISTRIBUTED DENIAL OF SERVICE ATTACK MITIGATION USING REINFORCEMENT LEARNING." Journal of Sustainable Solutions 2, no. 1 (2025): 11–18. https://doi.org/10.36676/j.sust.sol.v2.i1.54.
Full textEtza nofarita. "IMPLEMENTASI APLIKASI SOFTWARE NATURAL NETWORK MENDETEKSI TINGKATAN SERANGAN DDOS PADA JARINGAN KOMPUTER." Elkom : Jurnal Elektronika dan Komputer 14, no. 2 (2021): 268–77. http://dx.doi.org/10.51903/elkom.v14i2.501.
Full textEkawijana, Ardhian, Akhmad Bakhrun, and M. Teguh Kurniawan. "Deteksi Serangan DDOS Pada Jaringan SDN dengan Metode Random Forest." JURNAL MEDIA INFORMATIKA BUDIDARMA 8, no. 1 (2024): 685. http://dx.doi.org/10.30865/mib.v8i1.6928.
Full textPreet, Raman, Shaveta Rani, and Paramjeet Singh. "A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs." International Journal of Computer Sciences and Engineering 6, no. 1 (2018): 196–202. http://dx.doi.org/10.26438/ijcse/v6i1.196202.
Full textBilgili, Sedat, Gökçe Ertit, and Alper Kamil Demir. "CORE: Counteracting overwhelming requests effectively—A method for interest flooding attack mitigation in NDNoT." Computer and Telecommunication Engineering 2, no. 2 (2024): 2669. http://dx.doi.org/10.54517/cte2669.
Full text