To see the other types of publications on this topic, follow the link: Data flooding attack.

Journal articles on the topic 'Data flooding attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data flooding attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Saragih, Naikson, Ridho Agus Wery Nanda Panjaitan, and Mufria Jonatan Purba. "FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS." Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) 6, no. 2 (2023): 28–34. http://dx.doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932.

Full text
Abstract:
ABSTRACT-PT Kodinglab Integrasi Indonesia's Virtual Private Server (VPS) product requires good quality standards, including security. The challenge that arises is still frequent disruptions to the protection of PT Kodinglab's VPS customers, where it is difficult to identify the source of the attack. Network forensics in the form of dead forensics and live forensics using the NIST method with the stages of collection, examination, Analysis, and reporting are used to find the source of the attack. Data for dead forensics comes from snort tools, and data for live forensics comes from capture Wire
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Liang, Weiqing Yu, Zhijun Wu, and Silin Peng. "XGBoost-Based Detection of DDoS Attacks in Named Data Networking." Future Internet 17, no. 5 (2025): 206. https://doi.org/10.3390/fi17050206.

Full text
Abstract:
Named Data Networking (NDN) is highly susceptible to Distributed Denial of Service (DDoS) attacks, such as Interest Flooding Attack (IFA) and Cache Pollution Attack (CPA). These attacks exploit the inherent data retrieval and caching mechanisms of NDN, leading to severe disruptions in data availability and network efficiency, thereby undermining the overall performance and reliability of the system. In this paper, an attack detection method based on an improved XGBoost is proposed and applied to the hybrid attack pattern of IFA and CPA. Through experiments, the performance of the new attacks a
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Li Cui, Zhi Gang Wang, Tao Wang, Yong Shi Sun, and Xiao Fei Xu. "Research of Secure Scheme against Data Flooding Attack in Ad Hoc Networks." Advanced Materials Research 204-210 (February 2011): 395–99. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.395.

Full text
Abstract:
DATA flooding attack is a serious menace for the security of on-demand routing protocol in Ad Hoc networks. In the paper, on the basis of three typical on-demand routing protocols AODV, DSR and TORA, we present a special security scheme against data flooding attack. Then we simulate the scheme on NS2 platform and compare two performance parameters before and after using the scheme: average delay and packet delivery rate. The results indicate that this project is comparatively effective to resist the DATA flooding attack.
APA, Harvard, Vancouver, ISO, and other styles
4

Baldev Singh, Dr, Dr S.N. Panda, and Dr Gurpinder Singh Samra. "Slow flooding attack detection in cloud using change point detection approach." International Journal of Engineering & Technology 7, no. 2.30 (2018): 33. http://dx.doi.org/10.14419/ijet.v7i2.30.13459.

Full text
Abstract:
Cloud computing is one of the high-demand services and prone to numerous types of attacks due to its Internet based backbone. Flooding based attack is one such type of attack over the cloud that exhausts the numerous resources and services of an individual or an enterprise by way of sending useless huge traffic. The nature of this traffic may be of slow or fast type. Flooding attacks are caused by way of sending massive volume of packets of TCP, UDP, ICMP traffic and HTTP Posts. The legitimate volume of traffic is suppressed and lost in traffic flooding traffics. Early detection of such attack
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.

Full text
Abstract:
Advanced computer network technology enables the connectivity of computers in an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and cannot detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We propose a n
APA, Harvard, Vancouver, ISO, and other styles
6

Luong, Ngoc T., Tu T. Vo, and Doan Hoang. "FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2019 (January 10, 2019): 1–17. http://dx.doi.org/10.1155/2019/6869307.

Full text
Abstract:
Request route flooding attack is one of the main challenges in the security of Mobile Ad Hoc Networks (MANETs) as it is easy to initiate and difficult to prevent. A malicious node can launch an attack simply by sending an excessively high number of route request (RREQ) packets or useless data packets to nonexistent destinations. As a result, the network is rendered useless as all its resources are used up to serve this storm of RREQ packets and hence unable to perform its normal routing duty. Most existing research efforts on detecting such a flooding attack use the number of RREQs originated
APA, Harvard, Vancouver, ISO, and other styles
7

Anugrah, Ino, and Raden Hengki Rahmanto. "Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 5, no. 2 (2018): 91–106. http://dx.doi.org/10.33558/piksel.v5i2.271.

Full text
Abstract:
ABSTRACT
 
 Islamic University”45” computer network needs a safe network to strengthen the network security systems to protect servers from attacks such as Port Scanning and DoS attack (Denial of Service). One of the network security techniques is De-Militarized Zone (DMZ) that is a mechanism to protect the internal system from hacker attacks or other parties who want to enter the system with no access. The purpose of this Project is to implement LAN network security system using De-Militarized Zone (DMZ) technique, with a single firewall that supports the internal and external netwo
APA, Harvard, Vancouver, ISO, and other styles
8

L, Sheeba, and Meenakshi V S. "“HYBRID NODE WATCHING TECHNIQUE BASED DOS FLOODING ATTACK DETECTION IN WIRELESS SENSOR NETWORK." ICTACT Journal on Communication Technology 11, no. 4 (2020): 2292–300. https://doi.org/10.21917/ijct.2020.0339.

Full text
Abstract:
Intrusion detection is the most concentrated research issue in the wireless sensor network where presence of intrusion activities are most difficult to find where there is no centralized architecture to monitor. One of the most frequently found intrusion activities in wireless sensor network are Denial of Service (DoS) Flooding attacks. DoS flood attacks would send large volume of chunk messages to the end node in order to corrupt the functioning of the particular node. Some of the most important DoS flooding attacks that are found in the network are ICMP flood attack, Synchronous Flood attack
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Susu, Xun Liao, and Heyuan Shi. "A PSO-SVM for Burst Header Packet Flooding Attacks Detection in Optical Burst Switching Networks." Photonics 8, no. 12 (2021): 555. http://dx.doi.org/10.3390/photonics8120555.

Full text
Abstract:
An Optical Burst Switching (OBS) network is vulnerable to Burst Header Packet (BHP) flooding attack. In flooding attacks, edge nodes send BHPs at a high rate to reserve bandwidth for unrealized data bursts, which leads to a waste of bandwidth, a decrease in network performance, and massive data loss. Machine learning techniques are utilized to detect this attack in the OBS network. In this paper, we propose a particle swarm optimization–support vector machine (PSO-SVM) model for detecting BHP flooding attacks, in which the PSO is used to optimize the parameters of the SVM. We use the dataset p
APA, Harvard, Vancouver, ISO, and other styles
10

S, Nithish Babu, Yogesh V, Mariswaran S, and Gowtham N. "Detection of DDOS Attack using Decision Tree Classifier in SDN Environment." Journal of Ubiquitous Computing and Communication Technologies 5, no. 2 (2023): 193–202. http://dx.doi.org/10.36548/jucct.2023.2.006.

Full text
Abstract:
Software Defined Networking (SDN) is a dynamic architecture that employs a variety of applications for making networks more adaptable and centrally controlled. It is easy to attack the entire network in SDN because the control plane and data plane are separated. DDoS attack is major danger to SDN service providers because it can shut down the entire network and stop services to all customers at any time. One of the key flaws of most SDN architectures is lack of susceptibility to DDoS attacks with its types like TCP flooding, UDP flooding, SYN flooding, ICMP flooding and DHCP flooding for detec
APA, Harvard, Vancouver, ISO, and other styles
11

Dhanapal A and Nithyanandam P. "The HTTP Flooding Attack Detection to Secure and Safeguard Online Applications in the Cloud." International Journal of Information System Modeling and Design 10, no. 3 (2019): 41–58. http://dx.doi.org/10.4018/ijismd.2019070103.

Full text
Abstract:
Cloud computing is the cutting edge and has become inevitable in all forms of computing. This is due to its nature of elasticity, cost-effectiveness, availability, etc. The online applications like e-commerce, and e-healthcare applications are moving to the cloud to reduce their operational cost. These applications have the vulnerability of a HTTP flooding Distributed Denial of Service attack in the cloud. This flooding attack aims to overload the application, making it unable to process genuine requests and bring it down. So, these applications need to be secured and safeguarded against such
APA, Harvard, Vancouver, ISO, and other styles
12

Yunus, Warid, and Mohamad Efendi Lasulika. "Security System Analysis against Flood Attacks Using TCP, UDP, and ICMP Protocols on Mikrotik Routers." International Journal of Advances in Data and Information Systems 3, no. 1 (2022): 11–19. http://dx.doi.org/10.25008/ijadis.v3i1.1231.

Full text
Abstract:
Advances in information technology today require all existing computer networks to be able to show that the security system model continues to be considered very important for users who want security both from inside and outside the network. An attack on a network server can occur at any time, as for an attack that can cause a dangerous effect on a router, namely DDOS / flood by flooding the router with very many data packets so that the router can be paralyzed in terms of handling the network system. In this study, descriptive research was applied to obtain data directly by conducting floodin
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Licheng, Yun Pan, Mianxiong Dong, Yafang Yu, and Kun Wang. "Economic Levers for Mitigating Interest Flooding Attack in Named Data Networking." Mathematical Problems in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/4541975.

Full text
Abstract:
As a kind of unwelcome, unavoidable, and malicious behavior, distributed denial of service (DDoS) is an ongoing issue in today’s Internet as well as in some newly conceived future Internet architectures. Recently, a first step was made towards assessing DDoS attacks in Named Data Networking (NDN)—one of the promising Internet architectures in the upcoming big data era. Among them, interest flooding attack (IFA) becomes one of the main serious problems. Enlightened by the extensive study on the possibility of mitigating DDoS in today’s Internet by employing micropayments, in this paper we addre
APA, Harvard, Vancouver, ISO, and other styles
14

Han, Yu, Liumei Zhang, Yichuan Wang, Xi Deng, Zhendong Gu, and Xiaohui Zhang. "Research on the Security of IPv6 Communication Based on Petri Net under IoT." Sensors 23, no. 11 (2023): 5192. http://dx.doi.org/10.3390/s23115192.

Full text
Abstract:
The distribution of wireless network systems challenges the communication security of Internet of Things (IoT), and the IPv6 protocol is gradually becoming the main communication protocol under the IoT. The Neighbor Discovery Protocol (NDP), as the base protocol of IPv6, includes address resolution, DAD, route redirection and other functions. The NDP protocol faces many attacks, such as DDoS attacks, MITM attacks, etc. In this paper, we focus on the communication-addressing problem between nodes in the Internet of Things (IoT). We propose a Petri-Net-based NS flooding attack model for the floo
APA, Harvard, Vancouver, ISO, and other styles
15

Mink, Dustin M., Jeffrey McDonald, Sikha Bagui, et al. "Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B." Big Data and Cognitive Computing 5, no. 2 (2021): 27. http://dx.doi.org/10.3390/bdcc5020027.

Full text
Abstract:
Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual trajectory modifications or false alarm attacks, and aircraft spoofing. This work lays out a data mining process, in the context of big data, to determine flight patterns, including patterns for possible attacks, in the U.S. National Air Space (NAS). Flights outside the flight patterns are possible attacks. For this study, OpenSky was used as the data source of Automatic Dependent Surveillance-Broadcast (ADS-B) messages, NiFi was used fo
APA, Harvard, Vancouver, ISO, and other styles
16

Saputra, Aldi Sigit, and Dadan Irwan. "Sistem Keamanan Pada Jaringan Wireless Menggunakan Protokol RADIUS." JUSS (Jurnal Sains dan Sistem Informasi) 3, no. 2 (2020): 28–34. http://dx.doi.org/10.22437/juss.v3i2.10884.

Full text
Abstract:
Wireless networks require a security system to protect servers from attacks such as Port Scanning and Denial of Service. This research aims to design a wireless network security system using Remote Authentication Dial-In User Service or RADIUS protocol. The research stages include analysis of system requirements, preparation of completeness of system requirements, installation and configuration of the network and RADIUS protocol, detection and prevention testing of attacks, and analysis of test results. The design system used is to implement a single authentication, authorization, and accounti
APA, Harvard, Vancouver, ISO, and other styles
17

Zhang, Xin, Ru Li, and Wenhan Hou. "Attention-Based LSTM Model for IFA Detection in Named Data Networking." Security and Communication Networks 2022 (July 21, 2022): 1–14. http://dx.doi.org/10.1155/2022/1812273.

Full text
Abstract:
As one of the next generation networks, Named Data Networking (NDN) performs well on content distribution. However, it is vulnerable against a new type of denial-of-service (DoS) attacks, interest flooding attacks (IFAs), one of the fatal threats to NDN. The attackers request nonexist content to occupy the Pending Interest Table (PIT), and it causes the degradation of network performance. Because of the great harm and strong concealment of this attack, it is urgent to detect and throttle the attack. This paper proposes a detection mechanism based on Long Short-Term Memory (LSTM) with attention
APA, Harvard, Vancouver, ISO, and other styles
18

Rahmad, Gunawan, Ab Ghani Hadhrami, Khamis Nurulaqilla, Al Amien Januar, and Ismanto Edi. "Deep learning approach to DDoS attack with imbalanced data at the application layer." TELKOMNIKA 21, no. 05 (2023): 1060–67. https://doi.org/10.12928/telkomnika.v21i5.24857.

Full text
Abstract:
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access d
APA, Harvard, Vancouver, ISO, and other styles
19

Abdullah, Muhammad, Imran Raza, Tanveer Zia, and Syed Asad Hussain. "Interest flooding attack mitigation in a vehicular named data network." IET Intelligent Transport Systems 15, no. 4 (2021): 525–37. http://dx.doi.org/10.1049/itr2.12042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Magsi, Arif Hussain, Syed Agha Hassnain Mohsan, Ghulam Muhammad, and Suhni Abbasi. "A Machine Learning-Based Interest Flooding Attack Detection System in Vehicular Named Data Networking." Electronics 12, no. 18 (2023): 3870. http://dx.doi.org/10.3390/electronics12183870.

Full text
Abstract:
A vehicular ad hoc network (VANET) has significantly improved transportation efficiency with efficient traffic management, driving safety, and delivering emergency messages. However, existing IP-based VANETs encounter numerous challenges, like security, mobility, caching, and routing. To cope with these limitations, named data networking (NDN) has gained significant attention as an alternative solution to TCP/IP in VANET. NDN offers promising features, like intermittent connectivity support, named-based routing, and in-network content caching. Nevertheless, NDN in VANET is vulnerable to a vari
APA, Harvard, Vancouver, ISO, and other styles
21

Vivek Sharma. "Impact of RREQ Packet Flooding Attack on Wireless Sensor Networks: A Simulation-Based Study." Communications on Applied Nonlinear Analysis 31, no. 2s (2024): 277–86. http://dx.doi.org/10.52783/cana.v31.645.

Full text
Abstract:
This paper analyzes the impact of RREQ packet flooding on WSNs through simulations. WSNs are vital for applications like surveillance, healthcare, and environmental monitoring. However, they are susceptible to DoS attacks, such as RREQ packet flooding, which disrupts normal operations by overwhelming the network with excessive route requests. The study evaluates the effect of RREQ flooding on WSN performance metrics, including throughput, end-to-end delay, packet delivery ratio, energy consumption, and routing load. It also reviews relevant literature to provide background information and iden
APA, Harvard, Vancouver, ISO, and other styles
22

Arif Wirawan Muhammad, Muhammad Nur Faiz, and Ummi Athiyah. "Pengembangan Perangkat Lunak Untuk Deteksi DDoS Berbasis Neural Network." Infotekmesin 13, no. 2 (2022): 301–7. http://dx.doi.org/10.35970/infotekmesin.v13i2.1544.

Full text
Abstract:
System security issues are a vital factor that needs to be considered in the operation of systems and networks, which will later be used for disaster mitigation and preventing attacks on the network. Distributed Denial of Services (DDoS) is a form of attack carried out by individuals or groups to damage data through servers or malware in the form of flooding packets, therefore it can paralyze the network system used. Network security is a factor that must be maintained and considered in an information system. DDoS can take the form of Ping of Death, flood, Remote control attack, User Data Prot
APA, Harvard, Vancouver, ISO, and other styles
23

S.Kalai vani, Y., and Dr P.Ranjana. "Anomaly Detection in Distributed Denial of Service Attack using Map Reduce Improvised counter-based algorithm in Hadoop." International Journal of Engineering & Technology 7, no. 4.36 (2018): 390. http://dx.doi.org/10.14419/ijet.v7i4.36.23811.

Full text
Abstract:
A Distributed Denial of Service (DDOS) is one of the major threats in the cyber network and it causes the computers flooded with the Users Datagram Packet (UDP).This type of attack crashes the victim with large volume of traffic and the victim is not capable of performing normal communication and crashes it completely. To handle this DDOS attack the normal Intrusion Detection System is not suitable to hold and find the amount of the data in the network. Hadoop is a frame work that allows huge amount of data and it is used to processes the huge amount of data. A Map reduce program comprises of
APA, Harvard, Vancouver, ISO, and other styles
24

Alhammadi, Nafea A. Majeed, Mohamed Mabrouk, and Mounir Zrigui. "Recent Trends on Sophisticated types of Flooding Attacks and Detection Methods based on Multi Sensors Fusion Data for Cloud Computing Systems." Fusion: Practice and Applications 11, no. 1 (2023): 37–56. http://dx.doi.org/10.54216/fpa.110103.

Full text
Abstract:
Data storage, software services, infrastructure services, and platform services are only some of the benefits of today's widespread use of cloud computing. Since most cloud services run via the internet, they are vulnerable to a comprehensive range of attacks that might end it the disclosure of sensitive information. The distributed denial-of-service (DDoS) is amongst the attacks that pose an active threat to the cloud environment and disrupts the provided services for the legitimate participants. The main aim of this review paper is to present the recent trends on sophisticated flooding attac
APA, Harvard, Vancouver, ISO, and other styles
25

Almaslukh, Bandar. "An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks." Security and Communication Networks 2020 (August 5, 2020): 1–11. http://dx.doi.org/10.1155/2020/8840058.

Full text
Abstract:
Optical burst switching (OBS) networks are frequently compromised by attackers who can flood the networks with burst header packets (BHPs), causing a denial of service (DoS) attack, also known as a BHP flooding attack. Nowadays, a set of machine learning (ML) methods have been embedded into OBS core switches to detect these BHP flooding attacks. However, due to the redundant features of BHP data and the limited capability of OBS core switches, the existing technology still requires major improvements to work effectively and efficiently. In this paper, an efficient and effective ML-based securi
APA, Harvard, Vancouver, ISO, and other styles
26

Bi, Jia Na, and E. Xu. "A Secure and Energy-Efficient Rooting Protocol for WSN." Applied Mechanics and Materials 347-350 (August 2013): 1699–704. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1699.

Full text
Abstract:
In directed diffusion rooting protocol, interest and exploratory data are disseminated by flooding, which will bring broadcast storm resulting in substantial energy consumption of wireless sensor networks. Grid-based directed diffusion rooting protocol can improve energy efficiency where geographic grids are constructed by self-organization of nodes using location information. Flooding of interest and exploratory data is limited in grid head nodes. But grid-based directed diffusion rooting protocol considers less about security. To adapt to environments with high security requirements, traffic
APA, Harvard, Vancouver, ISO, and other styles
27

Azis, Muhammad Misbahul, Yufiz Azhar, and Syaifuddin Syaifuddin. "Analisa Sistem Identifikasi DDoS Menggunakan KNN Pada Jaringan Software Defined Network(SDN)." Jurnal Repositor 2, no. 7 (2020): 915. http://dx.doi.org/10.22219/repositor.v2i7.762.

Full text
Abstract:
AbstrakAbstrak - Kebutuhan pada jaringan mengutamakan performa untuk mendukung sebuah efisiensi jaringan merupakan hal penting untuk saat ini. Penentuan konfigurasi yang semakin banyak dan kompleks serta kontrol jaringan yang semakin rumit, membuat jaringan semakin tidak fleksibel dan susah untuk diterapkan pada sebuah topologi jaringan yang besar. Software Defined Network (SDN) muncul dengan mekanisme yang dapat menyelesaikan masalah tersebut. Pada dasarnya konsep dari Software Defined Network (SDN) adalah memisahkan kontroller dan data/forwarding plane, sehingga mampu untuk me-menejemen jari
APA, Harvard, Vancouver, ISO, and other styles
28

P. Narode, Miss Priyanka, and Prof I. R. Shaikh. "Review on EM-CURE Algorithm for Detection DDOS Attack." International Journal Of Engineering And Computer Science 7, no. 01 (2018): 23386–489. http://dx.doi.org/10.18535/ijecs/v7i1.04.

Full text
Abstract:
Distributed Denial of Service attack (DoS attack) is a cyber attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. It is necessary to analyze the fundamental features of DDoS attacks because these attacks can easily vary the used port/protocol,
APA, Harvard, Vancouver, ISO, and other styles
29

Verma, Priyanka, Shashikala Tapaswi, and W. Wilfred Godfrey. "An Impact Analysis and Detection of HTTP Flooding Attack in Cloud Using Bio-Inspired Clustering Approach." International Journal of Swarm Intelligence Research 12, no. 1 (2021): 29–49. http://dx.doi.org/10.4018/ijsir.2021010103.

Full text
Abstract:
The application layer HTTP flooding attack is the primary threat to web servers hosting web services in the cloud network. Due to varying network changes in the cloud, the traditional security methods are not sufficient to detect the attack. Therefore, a novel approach is proposed, which uses Teacher Learner Based Optimization (TLBO) for clustering to identify the attack requests. In this work, the logs of a web server under attack are collected and pre-processed. Further, Principal Component Analysis (PCA) is used to reduce the dimensionality of the pre-processed data. Thereafter the data is
APA, Harvard, Vancouver, ISO, and other styles
30

Rao T, Srinivasa, Harsha G, Kiran V, and Hemanth Kumar K. "Dos flooding attack control in information-centric networks." International Journal of Engineering & Technology 7, no. 1.1 (2017): 303. http://dx.doi.org/10.14419/ijet.v7i1.1.9708.

Full text
Abstract:
ICN (Information-centric networking) is a modern networking standard that mainly works only on the content extraction from a network without taking into case about the storage location or how the content is represented. In ICN providing security for the content is more important. Here we don’t concentrate on protecting path. In order to fulfil the security goals in the new standard, it is very decisive to have a clear complete comprehension about ICN attacks and their brief allocation and the solutions. In this paper we in brief explain the attacks which effect the ICN network and other relate
APA, Harvard, Vancouver, ISO, and other styles
31

Ramli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.

Full text
Abstract:
Distributed Denial of Service (DDoS) is a type of active attack, an attack that can overwhelm a system by flooding a computer or server with network traffic, disrupting user services. The goal of this attack is usually to disable services and disconnect from the compromised­­­­­­­­ computer or network. The impact is very large for companies or agencies that offer services. Victims of these attacks are unable to provide the services they are supposed to. Due to a bug or constraint on the server you are trying to use and one of the ways to deal with these attacks is to use a computer network fir
APA, Harvard, Vancouver, ISO, and other styles
32

Xu, Yabin, Peiyuan Gu, and Xiaowei Xu. "Research on Detection Method of Interest Flooding Attack in Named Data Networking." Intelligent Automation & Soft Computing 29, no. 3 (2021): 113–27. http://dx.doi.org/10.32604/iasc.2021.018895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wu, Zhijun, Wenzhi Feng, Jin Lei, and Meng Yue. "I-CIFA: An improved collusive interest flooding attack in named data networking." Journal of Information Security and Applications 61 (September 2021): 102912. http://dx.doi.org/10.1016/j.jisa.2021.102912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Akinsolu, Mobayode O., Abimbola O. Sangodoyin, and Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis." Mathematics 10, no. 14 (2022): 2536. http://dx.doi.org/10.3390/math10142536.

Full text
Abstract:
To provide a low-cost methodical way for inference-driven insight into the assessment of SDN operations, a behavioral study of key network parameters that predicate the proper functioning and performance of software-defined networks (SDNs) is presented to characterize their alterations or variations, given various emulated SDN scenarios. It is standard practice to use simulation environments to investigate the performance characteristics of SDNs, quantitatively and qualitatively; hence, the use of emulated scenarios to typify the investigated SDN in this paper. The key parameters studied analy
APA, Harvard, Vancouver, ISO, and other styles
35

Kurniawan, Andre Arta, Jusak, and Musayyanah. "Intrusion Detection System Using Deep Learning for DoS Attack Detection." JEECS (Journal of Electrical Engineering and Computer Sciences) 6, no. 2 (2021): 1087–98. http://dx.doi.org/10.54732/jeecs.v6i2.203.

Full text
Abstract:
Various attacks on a computer network or the internet have generated many incidents and cases, this makes security threats in using the internet or computer networks a major focus. Denial of Service attack or often referred to as DoS attack is one of the attack techniques that carry out flooding packets or requests to the target computer until the target computer is down. Prevention is needed in order to minimize existing attacks. IDS can be used as a detector in network traffic, but because IDS has its limitations, an IDS system is built using Deep Learning to detect DoS attacks. By using the
APA, Harvard, Vancouver, ISO, and other styles
36

Tun, Thazin. "A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark." Transactions on Networks and Communications 8, no. 3 (2020): 08–15. http://dx.doi.org/10.14738/tnc.83.8250.

Full text
Abstract:
The usage of Denial of Service (DoS) and Distributed Denial of Service (DDoS) packets by the assailant may change and dependent on various sorts of administrations and protocols. A flooding DDoS attack depends on an immense volume of assault traffic which is named as a Flooding based DDoS packet. Flooding-based DDoS packet endeavors to block the injured individual's system transfer speed with genuine-looking however undesirable IP information. Because of which Legitimate IP packets can’t arrive at the unfortunate casualty in view of the absence of data transfer capacity asset. Internet Control
APA, Harvard, Vancouver, ISO, and other styles
37

Khan, Inam Ullah, Asrin Abdollahi, Ryan Alturki, et al. "Intelligent Detection System Enabled Attack Probability Using Markov Chain in Aerial Networks." Wireless Communications and Mobile Computing 2021 (September 9, 2021): 1–9. http://dx.doi.org/10.1155/2021/1542657.

Full text
Abstract:
The Internet of Things (IoT) plays an important role to connect people, data, processes, and things. From linked supply chains to big data produced by a large number of IoT devices to industrial control systems where cybersecurity has become a critical problem in IoT-powered systems. Denial of Service (DoS), distributed denial of service (DDoS), and ping of death attacks are significant threats to flying networks. This paper presents an intrusion detection system (IDS) based on attack probability using the Markov chain to detect flooding attacks. While the paper includes buffer queue length by
APA, Harvard, Vancouver, ISO, and other styles
38

Pradhana, Ilman, Imam Riadi, and Yudi Prayudi. "Forensik Router untuk Mendeteksi Flooding Attack Menggunakan Metode Live Forensic." JRST (Jurnal Riset Sains dan Teknologi) 5, no. 1 (2021): 31. http://dx.doi.org/10.30595/jrst.v5i1.7662.

Full text
Abstract:
Teknologi informasi di era saat ini menunjukkan perkembangan yang pesat khususnya dalam bidang komputer berbasis jaringan. Di sisi lain, terdapat beberapa oknum-oknum tertentu yang menyalahgunakan teknologi tersebut salah satunya dengan melakukan serangan pada jaringan komputer. Router merupakan perangkat jaringan yang dapat membuat jaringan lokal bisa terhubung ke jaringan public. Router seringkali menjadi target serangan, hal ini dikarenakan Router menjadi jalur lalu lintas pengiriman data. Flooding Attack merupakan salah satu serangan pada jaringan komputer. Serangan yang dilakukan bertujua
APA, Harvard, Vancouver, ISO, and other styles
39

Nguyen, Tan, Hoang-Long Mai, Remi Cogranne, et al. "Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking." IEEE Transactions on Information Forensics and Security 14, no. 9 (2019): 2470–85. http://dx.doi.org/10.1109/tifs.2019.2899247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approac
APA, Harvard, Vancouver, ISO, and other styles
41

P. Arul, Et al. "Predicting the Attacks in IoT Devices using DP Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (2023): 164–68. http://dx.doi.org/10.17762/ijritcc.v11i11.9133.

Full text
Abstract:
The fundamental goal of this study is to predict cyber-attacks before they occur and to protect the network. Most existing attack detection algorithms cannot identify zero day attacks because they lack previously known data patterns to predict the threat, which is one of the biggest issues in the existing approaches. This research work offers a novel prediction method based on Gaussian regression that identifies cyber-attacks utilizing a unique dual data pattern categorization technique with no false positives. To improve the accuracy of the prediction and to reduce the prediction time consump
APA, Harvard, Vancouver, ISO, and other styles
42

Warcita, Kurniabudi, and Eko Arip Winanto. "Detection of UDP Flooding DDoS Attacks on IoT Networks Using Recurrent Neural Network." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 13, no. 3 (2024): 471–81. https://doi.org/10.23887/janapati.v13i3.79601.

Full text
Abstract:
Internet of Thing (IoT) is a concept where an object can transfer data through a network without requiring human interaction. Complex IoT networks make it vulnerable to cyber attacks such as DDoS UDP Flood attacks, UDP Flood attacks can disrupt IoT devices. Therefore, this study proposes an attack detection method using a deep learning approach with the Recurrent Neural Network (RNN) method. This study uses Principle Component Analysis (PCA) to reduce the feature dimension, before learning using RNN. The purpose of this study is to test the combined performance of the PCA and RNN methods to de
APA, Harvard, Vancouver, ISO, and other styles
43

Oussama, Sbai, and Elboukhari Mohamed. "Deep learning intrusion detection system for mobile ad hoc networks against flooding attacks." International Journal of Artificial Intelligence (IJ-AI) 11, no. 3 (2022): 878–85. https://doi.org/10.11591/ijai.v11.i3.pp878-885.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are infrastructure-less, dynamic wireless networks and self-configuring, in which the nodes are resource constrained. With the exponential evolution of the paradigm of smart homes, smart cities, smart logistics, internet of things (IoT) and internet of vehicle (IoV), MANETs and their networks family, such as flying ad-hoc networks (FANETs), vehicular ad-hoc networks (VANETs), and wireless sensor network (WSN), are the backbone of the whole networks. Because of their multitude use, MANETs are vulnerable to various attacks, so intrusion detection systems (IDS) are
APA, Harvard, Vancouver, ISO, and other styles
44

Xu, Ziyi. "Deep Learning Based DDoS Attack Detection." ITM Web of Conferences 70 (2025): 03005. https://doi.org/10.1051/itmconf/20257003005.

Full text
Abstract:
Nowadays, one of the biggest risks to network security is Distributed Denial of Service (DDoS) assaults, which cause disruptions to services by flooding systems with malicious traffic. Traditional approaches to detection, based on statistical thresholds and signature-based mechanisms, respectively, can hardly cope with the increasing complexity of such an attack. In order to improve detection accuracy and generalization, this research suggests a deep learning-based detection model that combines the Long Short-Term Memory (LSTM) network architecture with Convolutional Neural Networks (CNN). On
APA, Harvard, Vancouver, ISO, and other styles
45

Baba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.

Full text
Abstract:
Mobile Ad-Hoc Networks are infrastructure-less wireless communication technology that interconnects mobile devices such as phones, laptops, and smart devices including providing flexibility, seamless communication and mobility to all devices forming the network. MANET suffers security lapses due to the absence of central control infrastructure to monitor and control the devices that joins the network. These security lapses in MANET discourage it and makes it vulnerable to attacks such as denial of service attacks. Amongst various attacks prevalent on MANET environment, packet flooding is a com
APA, Harvard, Vancouver, ISO, and other styles
46

Saurabh Kansal. "DISTRIBUTED DENIAL OF SERVICE ATTACK MITIGATION USING REINFORCEMENT LEARNING." Journal of Sustainable Solutions 2, no. 1 (2025): 11–18. https://doi.org/10.36676/j.sust.sol.v2.i1.54.

Full text
Abstract:
Cybersecurity is threatened by Distributed Denial of Service (DDoS) attacks that destabilize network services by flooding systems with wrongful traffic. Unlike more conventional threat countermeasures, they fail to manage dynamic attack trajectories. In contrast, reinforcement learning provides a dynamic approach since systems improve their learning and response to the emerging threats in a real-time exercise. In this paper, reinforcement learning is used to study DDoS attack prevention and the study including the method, data set and measure used is discussed. Primary conclusions confirm stra
APA, Harvard, Vancouver, ISO, and other styles
47

Etza nofarita. "IMPLEMENTASI APLIKASI SOFTWARE NATURAL NETWORK MENDETEKSI TINGKATAN SERANGAN DDOS PADA JARINGAN KOMPUTER." Elkom : Jurnal Elektronika dan Komputer 14, no. 2 (2021): 268–77. http://dx.doi.org/10.51903/elkom.v14i2.501.

Full text
Abstract:
Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware tha
APA, Harvard, Vancouver, ISO, and other styles
48

Ekawijana, Ardhian, Akhmad Bakhrun, and M. Teguh Kurniawan. "Deteksi Serangan DDOS Pada Jaringan SDN dengan Metode Random Forest." JURNAL MEDIA INFORMATIKA BUDIDARMA 8, no. 1 (2024): 685. http://dx.doi.org/10.30865/mib.v8i1.6928.

Full text
Abstract:
Distributed Denial Service (DDoS) Attack is an attempt by an attacker to paralyze a network system by flooding it with requests. A busy system can cause a drop in performance and even crash. Software Defined Service (SDN) is a new paradigm in creating a network in a certain area. SDN, with all its advantages and flexibility in implementation, is attractive to implement, but still leaves major security problems, especially being vulnerable to DDoS attacks. This research will detect whether a particular request is DDoS or not. Random Forest is a method for developing Decision Trees to classify w
APA, Harvard, Vancouver, ISO, and other styles
49

Preet, Raman, Shaveta Rani, and Paramjeet Singh. "A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs." International Journal of Computer Sciences and Engineering 6, no. 1 (2018): 196–202. http://dx.doi.org/10.26438/ijcse/v6i1.196202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bilgili, Sedat, Gökçe Ertit, and Alper Kamil Demir. "CORE: Counteracting overwhelming requests effectively—A method for interest flooding attack mitigation in NDNoT." Computer and Telecommunication Engineering 2, no. 2 (2024): 2669. http://dx.doi.org/10.54517/cte2669.

Full text
Abstract:
<p>The<strong> </strong>Named Data Network (NDN) is a promising architecture for the near future. NDN communicates by naming data, unlike IP-based Internet architecture. Architectural understandability, ease of use, security, content presentation, and simplicity of data exchange logic make this architecture preferable. The NDNoT approach, which recently combines IoT and NDN, enables Internet of Things applications using NDN naming conventions and basic data structure. However, increasing technological applications bring security vulnerabilities. In this study, we propose a ne
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!