Academic literature on the topic 'Ddos'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ddos.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Ddos"

1

Abdelhaq, Maha, Raed Alsaqour, Mada Alaskar, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844. http://dx.doi.org/10.11591/ijece.v10i5.pp4844-4852.

Full text
Abstract:
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Pro
APA, Harvard, Vancouver, ISO, and other styles
2

Maha, Abdelhaq, Alsaqour Raed, Alaskar Mada, et al. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (2020): 4844–52. https://doi.org/10.11591/ijece.v10i5.pp4844-4852.

Full text
Abstract:
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Pro
APA, Harvard, Vancouver, ISO, and other styles
3

Mazur, Katarzyna, Bogdan Ksiezopolski, and Radoslaw Nielek. "Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5017248.

Full text
Abstract:
The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack
APA, Harvard, Vancouver, ISO, and other styles
4

Hunt, Nicholas, Tom Bergan, Luis Ceze, and Steven D. Gribble. "DDOS." ACM SIGARCH Computer Architecture News 41, no. 1 (2013): 499–508. http://dx.doi.org/10.1145/2490301.2451170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hunt, Nicholas, Tom Bergan, Luis Ceze, and Steven D. Gribble. "DDOS." ACM SIGPLAN Notices 48, no. 4 (2013): 499–508. http://dx.doi.org/10.1145/2499368.2451170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jing, Hengchang, and Jian Wang. "Detection of DDoS Attack within Industrial IoT Devices Based on Clustering and Graph Structure Features." Security and Communication Networks 2022 (March 7, 2022): 1–9. http://dx.doi.org/10.1155/2022/1401683.

Full text
Abstract:
Network available and accessible is of great importance to the Internet of things (IoT) devices. In this study, a novel machine learning method is presented to predict the occurrence of distributed denial-of-service (DDoS) attacks. Firstly, a structure of edges and vertices within graph theory is created to simultaneously extract traffic data characteristics. Eight characteristics of traffic data are selected as input variables. Secondly, the principal component analysis (PCA) model is adopted to extract DDoS and normal communication features further. Then, DDoSs are detected by fuzzy C-means
APA, Harvard, Vancouver, ISO, and other styles
7

Acharya, Saket, and Nitesh Pradhan. "DDoS Simulation and Hybrid DDoS Defense Mechanism." International Journal of Computer Applications 163, no. 9 (2017): 20–24. http://dx.doi.org/10.5120/ijca2017913736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abdullayeva, Fargana J. "Convolutional Neural Network-Based Automatic Diagnostic System for AL-DDoS Attacks Detection." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–15. http://dx.doi.org/10.4018/ijcwt.305242.

Full text
Abstract:
Distributed denial of service (DDoS) attacks are one of the main threats to information security. The purpose of DDoS attacks at the network (IP) and transport (TCP) layers is to consume the network bandwidth and deny service to legitimate users of the target system. Application layer DDoS attacks (AL-DDoS) can be organized against many different applications. Many of these attacks target HTTP, in which case their goal is to deplete the resources of web services. Various schemes have been proposed to detect DDoS attacks on network and transport layers. There are very few works being done to de
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Jian, Qidi Liang, Rui Jiang, and Xi Li. "A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors." Applied Sciences 9, no. 21 (2019): 4633. http://dx.doi.org/10.3390/app9214633.

Full text
Abstract:
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks. Therefore, improving the ubiquitous detection capability of DDoS attacks and accurately and quickly identifying DDoS attack traffic play an important role in later attack mitigation. This paper proposes a method to efficiently detect and identify multivector DDoS attacks. The detection algorithm is applicable to known and unknown DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

D., Glăvan. "DDoS detection and prevention based on artificial intelligence techniques." Scientific Bulletin of Naval Academy XXII, no. 1 (2019): 134–43. http://dx.doi.org/10.21279/1454-864x-19-i1-018.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks have been the major threats for the Internet and can bring great loss to companies and governments. With the development of emerging technologies, such as cloud computing, Internet of Things (IoT), artificial intelligence techniques, attackers can launch a huge volume of DDoS attacks with a lower cost, and it is much harder to detect and prevent DDoS attacks, because DDoS traffic is similar to normal traffic. Some artificial intelligence techniques like machine learning algorithms have been used to classify DDoS attack traffic and detect DDoS attack
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Ddos"

1

Sönnerfors, Peter, Elliot Nilsson, and Michael Gustafsson. "DDoS-skydd för hemanvändare : En studie kring DDoS." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-34952.

Full text
Abstract:
Att försörja sig som streamingpersonlighet på Internet är något som vuxit explosionsartatpå senare tid. Detta leder också till att man blir ett tydligt mål för attacker. Detta arbetehar belyst den problematik som DDoS-attacker skapar när de riktas mot hemanvändare.Olika lösningar på detta problem gås igenom och analyseras. Tester har utförts för attbelysa enkelheten i attacken samt hur den påverkar hemanvändares hårdvara. Testernahar resulterat i att VPN är en kompetent lösning men innehåller även nackdelar.<br>To make a living as streaming personality on the Internet is something that has gro
APA, Harvard, Vancouver, ISO, and other styles
2

Andersson, Emil. "DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20596.

Full text
Abstract:
Internetfenomenet ”Distributed Denial of Service”, förkortat DDoS, beskrivs ofta som ett av destörsta hoten mot Internet idag. Genom att utnyttja den grundläggande strukturen i kommunikationmellan nätverk och datorer kan kriminella blockera och stänga ute webbplatser och -tjänster frånanvändare, samtidigt som det är mycket svårt för offret och myndigheter att någonsin identifieraden eller de skyldiga. Enorma globala nätverk av ovetande människors infekterade datorer fjärrstyrstill att utföra angrepp mot alla sorters organisationer på Internet med olika motiv, som finansiella,politiska eller fö
APA, Harvard, Vancouver, ISO, and other styles
3

Nagy, Peter. "Automatická mitigace DDoS útoku." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-386011.

Full text
Abstract:
The aim of this thesis is automation of DDoS attack mitigation. This thesis provides an overview of GNU/Linux network platforms and different approaches for their configuration. The aim is to select a platform that could be extended to automate DDoS mitigation. DDoS attack types are explained as well. Selected methods for DDoS mitigation are described in more detail such as Remote Triggered Black Hole and BGP Flowspec. Existing tools like DDoS Defender and FastNetMon are used to detect a DDoS attack. NETX was chosen as target implementation platform. To communicate with devices, API or BGP pro
APA, Harvard, Vancouver, ISO, and other styles
4

Arikan, Erinc. "Attack profiling for DDoS benchmarks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file Mb., 96 p, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:1435821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hurta, Marek. "Odvozování pravidel pro mitigaci DDoS." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363809.

Full text
Abstract:
This thesis is aimed at monitoring of computer networks using NetFlow data. It describes main aspects of detection network anomalies using IDS systems. Next part describes Nemea framework, which is used for creating modules. These modules are able to detect network incidents and attacks. Following chapters contain a brief overview of common network attacks with their specific remarks which can help in process of their detection. Based on this analysis, the concept of mitigation rules was created. These rules can be used for mitigation of DDoS attack. This method was tested on several data sets
APA, Harvard, Vancouver, ISO, and other styles
6

Flandrin, Flavien. "Rate based IPS for DDoS." Thesis, Edinburgh Napier University, 2010. http://researchrepository.napier.ac.uk/Output/4007.

Full text
Abstract:
Nowadays every organisation is connected to the Internet and more and more of the world population have access to the Internet. The development of Internet permits to simplify the communication between the people. Now it is easy to have a conversation with people from everywhere in the world. This popularity of Internet brings also new threats like viruses, worm, Trojan, or denial of services. Because of this, companies start to develop new security systems, which help in the protection of networks. The most common security tools used by companies or even by personal users at home are firewall
APA, Harvard, Vancouver, ISO, and other styles
7

Sikora, Marek. "Detekce slow-rate DDoS útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317019.

Full text
Abstract:
This diploma thesis is focused on the detection and protection against Slow DoS and DDoS attacks using computer network traffic analysis. The reader is introduced to the basic issues of this specific category of sophisticated attacks, and the characteristics of several specific attacks are clarified. There is also a set of methods for detecting and protecting against these attacks. The proposed methods are used to implement custom intrusion prevention system that is deployed on the border filtering server of computer network in order to protect Web servers against attacks from the Internet. Th
APA, Harvard, Vancouver, ISO, and other styles
8

Kommareddy, Christopher. "Detecting DDoS attacks in stub domains." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3324.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
9

Nilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.

Full text
Abstract:
A DDoS attack is an attempt to bring down a machine connected to the Internet. This is done by having multiple computers repeatedly sending requests to tie up a server making it unable to answer legitimate requests. DDoS attacks are currently one of the biggest security threats on the internet according to security experts. We used a qualitative interview with experts in IT security to gather data to our research. We found that most companies are lacking both in knowledge and in their protection against DDoS attacks. The best way to minimize this threat would be to build a system with redundan
APA, Harvard, Vancouver, ISO, and other styles
10

Hansen, Richard E. M. Eng Massachusetts Institute of Technology. "Stateful anycast for distributed DDoS mitigation." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41539.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Includes bibliographical references (p. 97-103).<br>Distributed denial-of-service (DDoS) attacks can easily cripple victim hosts or networks, yet effective defenses remain elusive. Normal anycast can be used to force the diffusion of attack traffic over a group of several hosts to increase the difficulty of saturating resources
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Ddos"

1

Mather, Ann. Cysgod ddoe. Cyhoeddiadau Mei, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Annes, Glynn, ed. Newyddion ddoe. Gwasg Carreg Gwalch, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dix, Thelma. Ddoe a'i ddagrau. Gwasg Carreg Gwalch, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fawcett, Nick. Cyn ei ddod ? Cyhoeddiadau'r Gair, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tomos, Angharad. Ddoe a Heddiw. Y Lolfa Cyf, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beaty, Carole. Doliau ddoe a heddiw. CBAC, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Purkis, Sallie. Ceginau ddoe a heddiw. CBAC, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1954-, Jenkins Simon, ed. Iesu ddoe a heddiw. Hughes, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peter, Hope Jones, ed. Enlli ddoe a heddiw. Gwynedd Archives Service, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1946-, Jenkins Geraint H., ed. Cymru, ddoe a heddiw. Gwasg Prifysgol Rhydychen, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Ddos"

1

Schmidt, D., and S. M. Shalinie. "DDoS Testbed." In An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks. Springer India, 2011. http://dx.doi.org/10.1007/978-81-322-0277-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wisthoff, Michael. "DDoS Countermeasures." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54978-1_117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brooks, Richard R., and İlker Özçelik. "DDoS Lab." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Patil, Nilesh Vishwasrao, C. Rama Krishna, and Krishan Kumar. "SS-DDoS:." In Security and Resilience of Cyber Physical Systems. Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003185543-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yu, Shui. "DDoS Attack Detection." In Distributed Denial of Service Attack and Defense. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9491-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brooks, Richard R., and İlker Özçelik. "What is DDoS?" In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brooks, Richard R., and İlker Özçelik. "DDoS Research: Traffic." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brooks, Richard R., and İlker Özçelik. "DDoS Research: Testing." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brooks, Richard R., and İlker Özçelik. "DDoS Research: Evaluation." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brooks, Richard R., and İlker Özçelik. "Deceiving DDoS Detection." In Distributed Denial of Service Attacks. Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781315213125-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Ddos"

1

Chi, Kaiwen, Xiaohui Xie, Yannan Hu, et al. "E-DDoS: An Evaluation System for DDoS Attack Detection." In 2024 IEEE 32nd International Conference on Network Protocols (ICNP). IEEE, 2024. https://doi.org/10.1109/icnp61940.2024.10858578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunt, Nicholas, Tom Bergan, Luis Ceze, and Steven D. Gribble. "DDOS." In the eighteenth international conference. ACM Press, 2013. http://dx.doi.org/10.1145/2451116.2451170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Zhongqing, and Yue Zhang. "DDoS Event Forecasting using Twitter Data." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/580.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks have been significant threats to the Internet. Traditional research in cyber security focuses on detecting emerging DDoS attacks by tracing network package flow. A characteristic of DDoS defense is that rescue time is limited since the launch of attack. More resilient detection and defence models are typically more costly. We aim at predicting the likelihood of DDoS attacks by monitoring relevant text streams in social media, so that the level of defense can be adjusted dynamically for maximizing cost-effect. To our knowledge, this is a novel and ch
APA, Harvard, Vancouver, ISO, and other styles
4

Soon Hin Khor and Akihiro Nakao. "Overfort: Combating DDoS with peer-to-peer DDoS puzzle." In Distributed Processing Symposium (IPDPS). IEEE, 2008. http://dx.doi.org/10.1109/ipdps.2008.4536561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Xiangfeiyang, and Jonathan Thamrun. "An Intelligent DDoS Detection System to recognize and Prevent DDoS Attacks using Artificial Intelligence and Machine Learning." In 5th International Conference on Artificial Intelligence and Big Data. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.140412.

Full text
Abstract:
In response to the increasing threat of DDoS (Distributed Denial of Service) attacks, this project investigates fortifying defenses against such malicious invasions. The project incorporates a user-friendly UI featuring two buttons: one for uploading captured traffic files and another for analysis to classify whether it’s a DDoS attack. The background of the problem aspires to a robust and adaptive DDoS detection system to ensure the continuity of online services [14]. To resolve this, the project proposes an automated DDoS attack detection mechanism powered by Machine Learning and Artificial
APA, Harvard, Vancouver, ISO, and other styles
6

Moura, Giovane C. M., Ricardo de O. Schmidt, John Heidemann, et al. "Anycast vs. DDoS." In IMC 2016: Internet Measurement Conference. ACM, 2016. http://dx.doi.org/10.1145/2987443.2987446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Rahul, Rahul Karanam, Rahul Chowdary Bobba, and Raghunath S. "DDoS Defense Mechanism." In 2009 International Conference on Future Networks, ICFN. IEEE, 2009. http://dx.doi.org/10.1109/icfn.2009.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cardigliano, Alfredo, Luca Deri, and Tord Lundstrom. "Commoditising DDoS mitigation." In 2016 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2016. http://dx.doi.org/10.1109/iwcmc.2016.7577112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"THROTTLING DDoS ATTACKS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2009. http://dx.doi.org/10.5220/0002229001210126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Neves, Bruno, Filipe Leite, Lucas Jorge, Rahyan Paiva, Juliana Bezerra, and Vitor Curtis. "Exploring DDoS Mechanisms." In 14th International Conference on Software Technologies. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007835304600467.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Ddos"

1

Mortensen, A., T. Reddy, and R. Moskowitz. DDoS Open Threat Signaling (DOTS) Requirements. RFC Editor, 2019. http://dx.doi.org/10.17487/rfc8612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Andreasen, F., N. Teague, and R. Compton. DDoS Open Threat Signaling (DOTS) Architecture. Edited by A. Mortensen and T. Reddy.K. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Kihong. Scalable Protection Against DDOS and Worm Attacks. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada423164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boucadair, M., and T. Reddy.K. DDoS Open Threat Signaling (DOTS) Agent Discovery. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dobbins, R., D. Migault, R. Moskowitz, N. Teague, L. Xia, and K. Nishizuka. Use Cases for DDoS Open Threat Signaling. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mirkovic, Jelena. Benchmarks for Evaluation of Distributed Denial of Service (DDOS). Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada477282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Boucadair, M., T. Reddy.K, and W. Pan. Multihoming Deployment Considerations for DDoS Open Threat Signaling (DOTS). RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hayashi, Y., M. Chen, and L. Su. Use Cases for DDoS Open Threat Signaling (DOTS) Telemetry. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Blackert, W. J., R. L. Hom, A. K. Castner, R. M. Jokerst, and D. M. Gregg. Distributed Denial of Service-Defense Attack Tradeoff Analysis (DDOS-DATA). Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada429339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Allende López, Marcos, and Adrián Pareja. Open configuration options GAS Distribution Protocol for Permissioned-Public Ethereum-Based Blockchain Networks. Edited by Alejandro Pardo and Mariana Gutierrez. Inter-American Development Bank, 2022. http://dx.doi.org/10.18235/0004243.

Full text
Abstract:
This paper presents a protocol to manage decentralized access and use of Permissioned Public Blockchain Networks using Ethereum technology as the underlying protocol. It proposes a solution to avoid DDOS and enforce accountability while eliminating transaction fees. The protocol has been tested and implemented in the LACChain Blockchain Networks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!