To see the other types of publications on this topic, follow the link: DDoS attack detection.

Dissertations / Theses on the topic 'DDoS attack detection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 38 dissertations / theses for your research on the topic 'DDoS attack detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Saied, Alan. "Distributed Denial of Service (DDoS) attack detection and mitigation." Thesis, King's College London (University of London), 2015. http://kclpure.kcl.ac.uk/portal/en/theses/distributed-denial-of-service-ddos-attack-detection-and-mitigation(eaa45e51-f602-46da-a37a-75c3ae71d2db).html.

Full text
Abstract:
A Distributed Denial of Service (DDoS) attack is an organised distributed packet-storming technique that aims to overload network devices and the communication channels between them. Its major objective is to prevent legitimate users from accessing networks, servers, services, or other computer resources. In this thesis, we propose, implement and evaluate a DDoS Detector approach consisting of detection, defence and knowledge sharing components. The detection component is designed to detect known and unknown DDoS attacks using an Artificial Neural Network (ANN) while the defence component prev
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Yue. "Resilience Strategies for Network Challenge Detection, Identification and Remediation." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/10277.

Full text
Abstract:
The enormous growth of the Internet and its use in everyday life make it an attractive target for malicious users. As the network becomes more complex and sophisticated it becomes more vulnerable to attack. There is a pressing need for the future internet to be resilient, manageable and secure. Our research is on distributed challenge detection and is part of the EU Resumenet Project (Resilience and Survivability for Future Networking: Framework, Mechanisms and Experimental Evaluation). It aims to make networks more resilient to a wide range of challenges including malicious attacks, misconfig
APA, Harvard, Vancouver, ISO, and other styles
3

Goldschmidt, Patrik. "Potlačení DoS útoků s využitím strojového učení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-449294.

Full text
Abstract:
Útoky typu odoprenia služby (DDoS) sú v dnešných počítačových sieťach stále frekventovanejším bezpečnostným incidentom. Táto práca sa zameriava na detekciu týchto útokov a poskytnutie relevantných informácii za účelom ich mitigácie v reálnom čase. Spomínaná funkcionalita je dosiahnutá s využitím techník prúdového dolovania z dát a strojového učenia. Výsledkom práce je sada nástrojov zastrešujúca celý proces strojového učenia - od vlastnej extrakcie príznakov cez predspracovanie dát až po export natrénovaného modelu pripraveného na nasadenie v produkcii. Experimentálne výsledky vyhodnotené na v
APA, Harvard, Vancouver, ISO, and other styles
4

Abdelaty, Maged Fathy Youssef. "Robust Anomaly Detection in Critical Infrastructure." Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/352463.

Full text
Abstract:
Critical Infrastructures (CIs) such as water treatment plants, power grids and telecommunication networks are critical to the daily activities and well-being of our society. Disruption of such CIs would have catastrophic consequences for public safety and the national economy. Hence, these infrastructures have become major targets in the upsurge of cyberattacks. Defending against such attacks often depends on an arsenal of cyber-defence tools, including Machine Learning (ML)-based Anomaly Detection Systems (ADSs). These detection systems use ML models to learn the profile of the normal behavio
APA, Harvard, Vancouver, ISO, and other styles
5

Syed, Naeem Firdous. "IoT-MQTT based denial of service attack modelling and detection." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2020. https://ro.ecu.edu.au/theses/2303.

Full text
Abstract:
Internet of Things (IoT) is poised to transform the quality of life and provide new business opportunities with its wide range of applications. However, the bene_ts of this emerging paradigm are coupled with serious cyber security issues. The lack of strong cyber security measures in protecting IoT systems can result in cyber attacks targeting all the layers of IoT architecture which includes the IoT devices, the IoT communication protocols and the services accessing the IoT data. Various IoT malware such as Mirai, BASHLITE and BrickBot show an already rising IoT device based attacks as well a
APA, Harvard, Vancouver, ISO, and other styles
6

Кульчицький, Б. В., та Л. М. Куперштейн. "До проблеми формування набору даних для дослідження DDoS-атак". Thesis, ВНТУ, 2019. http://ir.lib.vntu.edu.ua//handle/123456789/24232.

Full text
Abstract:
В роботі розглянуто підходи щодо перевірки запропонованих методів виявлення атак. Проаналізовано наявні набори даних, які використовуються для створення систем виявлення DDoS-атак. Також, проаналізовано декілька інструментів, що використовуються для реалізації чи моделювання DDoS-атак для збору даних.<br>The paper considers approaches to checking the proposed method of detecting attacks. The existing datasets that scientists use to create DDoS-attack detection systems are analyzed. Also, there are several tools used to implement or simulate DDoS-attacks for data collection
APA, Harvard, Vancouver, ISO, and other styles
7

Náčin, Peter. "Detekce útoku SlowDrop." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442391.

Full text
Abstract:
The diploma thesis is focused on the detection of a slow DoS attack named SlowDrop. The attack tries to imitate a legitimate person with a slow internet connection and does not show a new strong signature, so the attack is difficult to detect. The diploma thesis is based on the work of Ing. Mazanek in which the SlowDrop attack script was created. At the theoretical level, the issue of DoS attacks is described in general, but also in particular. Furthermore, the work develops methods for solving the problem of SlowDrop attack detection. The methods are then defined in detail and tested in a sim
APA, Harvard, Vancouver, ISO, and other styles
8

Guerid, Hachem. "Systèmes coopératifs décentralisés de détection et de contre-mesures des incidents et attaques sur les réseaux IP." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0079/document.

Full text
Abstract:
La problématique des botnets, réseaux de machines infectées par des logiciels malveillants permettant de les contrôler à distance, constitue une préoccupation majeure du fait du nombre de machines infectées et des menaces associées: attaque par déni de service distribué (DDoS), spam, vol de données bancaires. Les solutions de lutte contre les botnets proposées présentent des limitations majeures dans le contexte d'un opérateur réseau (contraintes de volumétrie et de passage à l'échelle, respect de la confidentialité et de la vie privée des utilisateurs). Cette thèse propose quatre contribution
APA, Harvard, Vancouver, ISO, and other styles
9

Damour, Gabriel. "Information-Theoretic Framework for Network Anomaly Detection: Enabling online application of statistical learning models to high-speed traffic." Thesis, KTH, Matematisk statistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252560.

Full text
Abstract:
With the current proliferation of cyber attacks, safeguarding internet facing assets from network intrusions, is becoming a vital task in our increasingly digitalised economies. Although recent successes of machine learning (ML) models bode the dawn of a new generation of intrusion detection systems (IDS); current solutions struggle to implement these in an efficient manner, leaving many IDSs to rely on rule-based techniques. In this paper we begin by reviewing the different approaches to feature construction and attack source identification employed in such applications. We refer to these ste
APA, Harvard, Vancouver, ISO, and other styles
10

Guerid, Hachem. "Systèmes coopératifs décentralisés de détection et de contre-mesures des incidents et attaques sur les réseaux IP." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0079.

Full text
Abstract:
La problématique des botnets, réseaux de machines infectées par des logiciels malveillants permettant de les contrôler à distance, constitue une préoccupation majeure du fait du nombre de machines infectées et des menaces associées: attaque par déni de service distribué (DDoS), spam, vol de données bancaires. Les solutions de lutte contre les botnets proposées présentent des limitations majeures dans le contexte d'un opérateur réseau (contraintes de volumétrie et de passage à l'échelle, respect de la confidentialité et de la vie privée des utilisateurs). Cette thèse propose quatre contribution
APA, Harvard, Vancouver, ISO, and other styles
11

Kommareddy, Christopher. "Detecting DDoS attacks in stub domains." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3324.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.<br>Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
12

Landfors, Kristoffer. "DETECTION AND RESOLUTION OF VSI-DDOS ATTACKS FOR CONTAINERIZED CLOUDS." Thesis, Umeå universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-165181.

Full text
Abstract:
Very Short Intermi‹ent Distributed Denial of Service (VSI-DDoS) a‹ttack is a new form of DDoS a‹ttacks with potential to bypass many of the security measures used today and still severely damage the quality of service of web applications in cloud systems. Th‘e att‹acks consists of short bursts of legitimate packets which exploits vulnerabilities in the targeted system. With the growing popularity of using containers instead of Virtual Machines in clouds, this project presents an approach for detecting these a‹ttacks in a container based cloud system. Th‘e approach uses signal processing in the
APA, Harvard, Vancouver, ISO, and other styles
13

Al-Mafrachi, Basheer Husham Ali. "Detection of DDoS Attacks against the SDN Controller using Statistical Approaches." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1513738941473344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Mekhitarian, Araxi, and Amir Rabiee. "A simulation study of an application layer DDoS detection mechanism." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191145.

Full text
Abstract:
Over the last couple of years the rise of application layer Distributed Denial of Service (DDoS) attacks has significantly increased. Because of this, many issues have been raised on how organizations and companies can protect themselves from intrusions and damages against their systems and services. The consequences from these attacks are many, ranging from revenue losses for companies to stolen personal data. As the technologies are evolving, application layer DDoS attacks are becoming more effective and there is not a concrete solution that entirely protects against them. This thesis focuse
APA, Harvard, Vancouver, ISO, and other styles
15

Andersson, Karl, and Marcus Odlander. "Detecting a Distributed Denial-of-Service Attack Using Speed Test Data: A Case Study on an Attack with Nationwide Impact." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120611.

Full text
Abstract:
This thesis presents a case study that investigates a large Distributed Denial of Service (DDoS) attack and how it affected speed tests observed by the crowd-based speed test application Bredbandskollen.  Furthermore, the thesis also investigates the possibility of using crowd-based speed tests as a method to detect a DDoS attack. This method has very low overhead which makes it an interesting complement to other methods. This thesis also shows that there was a significant deviation in the number of measurements during the DDoS attack considered in the case study compared to the year average.
APA, Harvard, Vancouver, ISO, and other styles
16

Sikora, Marek. "Detekce slow-rate DDoS útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317019.

Full text
Abstract:
This diploma thesis is focused on the detection and protection against Slow DoS and DDoS attacks using computer network traffic analysis. The reader is introduced to the basic issues of this specific category of sophisticated attacks, and the characteristics of several specific attacks are clarified. There is also a set of methods for detecting and protecting against these attacks. The proposed methods are used to implement custom intrusion prevention system that is deployed on the border filtering server of computer network in order to protect Web servers against attacks from the Internet. Th
APA, Harvard, Vancouver, ISO, and other styles
17

Bediako, Peter Ken. "Long Short-Term Memory Recurrent Neural Network for detecting DDoS flooding attacks within TensorFlow Implementation framework." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66802.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks is one of the most widespread security attacks to internet service providers. It is the most easily launched attack, but very difficult and expensive to detect and mitigate. In view of the devastating effect of DDoS attacks, there has been the increase on the adaptation of a network detection technique to reveal the presence of DDoS attack before huge traffic buildup to prevent service availability. Several works done on DDoS attack detection reveals that, the conventional DDoS attack detection methods based on statistical divergence is useful, howe
APA, Harvard, Vancouver, ISO, and other styles
18

Alatram, Ala'a A. M. "A forensic framework for detecting denial-of-service attacks in IoT networks using the MQTT protocol." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2022. https://ro.ecu.edu.au/theses/2561.

Full text
Abstract:
In the domain of the Internet of Things (IoT), The Message Queueing Telemetry Protocol (MQTT) is the most widely used protocol for applications across a wide range of realms, including industrial automation, healthcare, smart homes, and smart cities; MQTT is also used in many other critical real-world applicastions. An example is BMW’s Car Sharing application, that uses MQTT to provide reliable connectivity. However, due to a lack of security considerations during the design of the MQTT protocol, all the networks implementing it are prone to cyberattacks, such as denial-of-service (DoS) attack
APA, Harvard, Vancouver, ISO, and other styles
19

K, Santhosh. "Distributed Detection of DDOS Attack." Thesis, 2011. http://raiith.iith.ac.in/598/1/CS09G003.pdf.

Full text
Abstract:
Denial Of Service (DOS) and Distributed Denial Of Service (DDOS) attacks are attempts to make a server resources unavailable to its intended users. Information Security has three fundamental objectives: they are information integrity, condentiality and availability. Denial Of Service attack is an attack on availability. In this attack the attacker makes the server busy in processing illegitimate requests thereby making server resources unavailable for legitimate clients. In Distributed Denial Of Service attack, multiple DOS attacks are carried out from several slaves (infected systems whi
APA, Harvard, Vancouver, ISO, and other styles
20

Su, Cheng-Yu, and 蘇正育. "DDoS Attack Detection Method Research on the Splunk." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/57930675069976481509.

Full text
Abstract:
碩士<br>國立臺南大學<br>經營與管理學系科技管理碩士在職專班<br>104<br>The whole society has a great progress with the rapid development of network technology, at mean time, the issues of attendant network security has become increasingly prominent, especially for DDoS attacks. Recently, almost all of the well-known network attacks are related to DDoS attacks, which leads to their great loss. Therefore, how to detect DDoS attacks sustainably becomes the urgent problem in the field of network security. The network would be congested when the amount of user visit exceeds a certain number because of the network bandwidth o
APA, Harvard, Vancouver, ISO, and other styles
21

Naik, Manish. "Early Detection and Prevention of DDOS attack on VANET." Thesis, 2015. http://ethesis.nitrkl.ac.in/6817/1/Early_Naik_2015.pdf.

Full text
Abstract:
Growing number of vehicles in use has ushered in the service to provide human and resource safety. The present trend calls for the application of technology to automate safety measures in road traffic and since has been known as Intelligent Transport System (ITS). Vehicular Ad hoc Network is like a fork to Mobile Ad hoc Network , where the nodes are mobile vehicles moving in constrained road topology. VANET networks are envisioned to be used in practical ITS systems around the world. A network standard has been developed as Wireless Access In Vehicular Environment (IEEE 802.11p) to be used in
APA, Harvard, Vancouver, ISO, and other styles
22

Kar, Sumit. "An Anomaly Detection Scheme for DDoS Attack in Grid Computing." Thesis, 2009. http://ethesis.nitrkl.ac.in/1473/1/An_anomaly_detection_system_for_ddos_attack_in_Grid.pdf.

Full text
Abstract:
The demand for computing power and storage is increasing continuously and there are applications like scientific research and industrial need, whose computational demand even exceeds the available fastest technologies. As a result it is an economically feasible mean to look into efficiently aggregate existing distributed resources. To achieving this goal makes it possible to build a shared large scale wide-area distributed computing infrastructure, a concept which has been named the Grid computing. The primary objective of Grid computing is to support the sharing of resources and service spann
APA, Harvard, Vancouver, ISO, and other styles
23

(6636224), Seunghee Lee. "Incremental Support Vector Machine Approach for DoS and DDoS Attack Detection." Thesis, 2019.

Find full text
Abstract:
<div> <div> <div> <p>Support Vector Machines (SVMs) have generally been effective in detecting instances of network intrusion. However, from a practical point of view, a standard SVM is not able to handle large-scale data efficiently due to the computation complexity of the algorithm and extensive memory requirements. To cope with the limitation, this study presents an incremental SVM method combined with a k-nearest neighbors (KNN) based candidate support vectors (CSV) selection strategy in order to speed up training and test process. The proposed incremental SVM method constructs or updates
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Pow-Wei, and 劉博瑋. "Using Intrusion Detection System and Traffic Control for DDoS Attack Mitigation." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/92281057830101055665.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程所<br>94<br>Denial of Service (DoS) refers to malicious paralyzing of network service resulting in the inaccessibility as well as non-usability of normal users. Distributed denial of Service (DDoS) attack has even become a category of major threat to network security. Current intrusion detection systems fail to guarantee perfect solutions, and normal packets have the possibility of being misjudged as malicious packets. Therefore in this paper, by combining the technology of intrusion detection and network traffic controlling, we have designed and implemented a defensive system
APA, Harvard, Vancouver, ISO, and other styles
25

Jevtic, Stefan G. "Network AIS-based DDoS attack detection in SDN environments with NS-3." Thesis, 2017. https://doi.org/10.7912/C25W80.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>With the ever increasing connectivity of and dependency on modern computing systems, our civilization is becoming ever more susceptible to cyberattack. To combat this, identifying and disrupting malicious traffic without human intervention becomes essential to protecting our most important systems. To accomplish this, three main tasks for an effective intrusion detection system have been identified: monitor network traffic, categorize and identify anomalous behavior in near real time, and take appropriate action against the identifie
APA, Harvard, Vancouver, ISO, and other styles
26

Liu, Yi-Hsueh, and 劉宜學. "The Study of a Congestion-Based DDoS Attack Detection in Wireless Mesh Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/58932870960342391453.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電子工程系<br>95<br>In recent years, distributed denial of service (DDoS) attacks pose an immense threat to wired networks, and this threat will also be serious in wireless mesh networks (WMNs). However, most of current defense mechanisms in wired networks can not be suited to defend against congestion-based DDoS attacks in WMNs. In this paper, we present an anomaly detection scheme working on each mesh router for congestion-based DDoS attacks in WMNs. We define two metrics named NodeCondition and RangeCondition to extract the features, and detect abnormal behaviors according to t
APA, Harvard, Vancouver, ISO, and other styles
27

MUKOKO, FUNGAYI DONEWELL. "USING HIDDEN MARKOV MODEL TOWARDS SECURING THE CLOUD: DETECTION OF DDoS SILENT ATTACKS." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15380.

Full text
Abstract:
Cloud Computing has presented itself as a promising solution to new entrepreneurs as well as existing organizations for management of their IT needs at various levels. Many cloud service providers have exposed cloud services at cheap prices, which allow users at all levels of society to materialize their ideas and make them available across the globe. While the response has been overwhelming, the application areas where security of data is of utmost importance have not shown much interest. Hence incorporating dependable security measures in the cloud computing technology would be a good
APA, Harvard, Vancouver, ISO, and other styles
28

Anchal. "Detection and Mitigation of DDoS Attack in Software Defined Networks (SDN) using Statistical Approach." Thesis, 2022. http://ethesis.nitrkl.ac.in/10335/1/2022_MTech_Research_Anchal_617CS6005_Detection.pdf.

Full text
Abstract:
Software-Defined Network (SDN) is a network management technology that makes the network efficient in performance and dynamic in nature. SDN attempts to centralize network intelligence in one network component by decoupling the data plane from the control plane. The SDN uses the OpenFlow protocol for communication with network layer components. The centralized behaviour has some vulnerabilities in terms of security, scalability, and elasticity, which are the primary security concerns of SDN. One of these critical issues is the impact of Distributed Denial of Service (DDoS) attack on SDN. In a
APA, Harvard, Vancouver, ISO, and other styles
29

Στυλιανού, Γεώργιος. "Αναγνώριση επιθέσεων web σε web-servers". Thesis, 2013. http://hdl.handle.net/10889/6139.

Full text
Abstract:
Οι επιθέσεις στο Διαδίκτυο και ειδικά οι επιθέσεις άρνησης εξυπηρέτησης (Denial of Service, DoS) αποτελούν ένα πολύ σοβαρό πρόβλημα για την ομαλή λειτουργία του Διαδικτύου. Αυτό το είδος επιθέσεων στοχεύει στην διατάραξη της καλής λειτουργίας ενός συστήματος, καταναλώνοντας τους πόρους του ή προκαλώντας υπερφόρτωση στο δίκτυο, καθιστώντας το ανίκανο να παρέχει στους πελάτες του τις υπηρεσίες για τις οποίες προορίζεται. Η αντιμετώπιση των επιθέσεων αυτών έχει απασχολήσει πολλούς ερευνητές τα τελευταία χρόνια και έχουν προταθεί πολλές διαφορετικές μέθοδοι πρόληψης, ανίχνευσης, και απόκρισης.
APA, Harvard, Vancouver, ISO, and other styles
30

Young, Wei-Jie, and 楊惟傑. "Intrusion Forecast, Detection and Traceback against DDoS attacks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/48050927329481397938.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程與科學系<br>93<br>DDoS( Distributed Denial of Service) is the most troublesome attack nowadays, especially for those people whose operation environment relies on network services and/or the Internet. However, attackers often penetrate innocent routers and hosts to make them unwittingly participate in such a large scale attack as zombies or reflectors. Network-based Intrusion Detection System (NIDS) is developed to monitor network traffic in order to detect network intrusion. But NIDS often lacks global cooperative capability. When facing attacks, e.g., DDoS, an intrusion detectio
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Yu-Sheng, and 李祐陞. "Uses Artificial Intelligence Detecting DDoS attacks on Video Conference." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/96106382854815525748.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊安全產業研發碩士專班<br>99<br>VoIP(Voice over Internet Protocol),compress and encode the voice and video signals, encapsulates the signals into packets and sends packets over the Internet. Video onference provides two-way real-time voice and video transmission of services. VoIP and Video Conference provides better quality than Public Switched Telephone Network (PSTN) at less cost. There are convenient and user friendly. But convenience usually accompanies security issues. That is what we need to pay much more attentions to. This study measures and analyzes the images of video conferenc
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Wei-Yu, and 陳韋佑. "Machine Learning-based DDoS Attacks Detection for Moving Target Defense Networks." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/5d68ev.

Full text
Abstract:
碩士<br>國立中央大學<br>資訊工程學系<br>107<br>In recent years, the Internet of Things (IoT) technology has developed rapidly. By 2020, it is expected that more than ten billion IoT devices surf on the Internet. Due to the low processing capabilities of IoT devices, the vulnerabilities of security mechanism cause the rapid growth of IoT-based botnets such as Mirai and Torii. Botnets are often used to implement Distributed Denial-of-Service (DDoS) attacks. The advancement of the Internet technology has made it easy for hackers to control a large of zombie devices and launch DDoS attacks. (TCP Flooding, UDP F
APA, Harvard, Vancouver, ISO, and other styles
33

Manso, Pedro Caetano. "A novel SDN-based intrusion detection system for early detection and mitigation of DDoS attacks." Master's thesis, 2018. http://hdl.handle.net/10071/18216.

Full text
Abstract:
A Internet teve o seu “boom” no meio dos anos 90. A sociedade mergulhou numa realidade “dot.com” com muitos serviços e plataformas disruptivas por todo o mundo. Atualmente, depois de quase 25 anos, a Internet provou que é uma tecnologia indispensável. Com este uso mundial da Internet, o esforço colocado no processo de gestão de redes aumentou. Para facilitar este processo, uma nova ideia surgiu, chamada de Software Defined Networks (SDN). SDN é um paradigma emergente que começou a ser amplamente usado em várias áreas, como por exemplo a Cloud Computing. Para além disso, com o crescimen
APA, Harvard, Vancouver, ISO, and other styles
34

Pai, Chia-Chi, and 白嘉琦. "CIDS-An Intrusion Detecting System Using Chi-Square for Detecting DoS/DDoS attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/32548985228378493610.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程與科學系碩士在職專班<br>97<br>Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces, from the Internet. Therefore, even a naive hacker can also launch a large-scale DoS or DDoS attack. In this paper, we propose a distributed intrusion detection architecture, named Chi-square based Intrusion Detection System (CIDS) which to detects DoS/DDoS attacks by invoking a statistic approach that compares source IP addresses’normal and current connection frequencies and accumulated packet sizes in order to discriminate whether there is an DoS/
APA, Harvard, Vancouver, ISO, and other styles
35

徐郁婷. "Detecting and Preventing DDoS Attacks in SDN-based Data Center Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/r7w33k.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊工程研究所<br>105<br>Distribute denial-of-service (DDoS) is a well known and long-lived attack types in the Internet. Due to botnets, DDoS attack has reached over 1 Tbps in 2016. Scrubbing centers (SCs) is the most common approach to eliminate DDoS traffic. However, the attack sources are unknown in advance, so it is difficult to optimize the strategic locations to deploy the SCs. Hence, the detour of DDoS traffic will engender significant network footprint from DDoS traffic through the Internet.Coordination of network function virtualization (NFV) and software-defined network(SDN) is a pro
APA, Harvard, Vancouver, ISO, and other styles
36

Zhou, Kai-Zhong, and 周楷鐘. "Detecting Hybrid DDoS Attacks with Flow Differentiation in Software-Defined Networking." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/8r8h9d.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>107<br>Distributed denial-of-service (DDoS) attacks have become one of the main attacks in the network nowadays. The target except providing servers for services, it may also be a link in infrastructure. For the current single type (server or link) DDoS attacks, many pieces of research have been conducted in the past, providing ways to detect these single type DDoS attacks. However, as the attacks techniques evolving, hybrid DDoS attacks can attack multiple targets (servers or links) simultaneously, attacking servers and chains as they attack multiple targets. The si
APA, Harvard, Vancouver, ISO, and other styles
37

Huang, Guan-Ci, and 黃冠錡. "Detecting the Web Server from DDoS Attacks by Using Three-Tier Model." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/72199146933221755182.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>94<br>According to FBI 2003 Computer Crime and Security Survey Result, Distributed Denial of Service Attack is the second dangerous network attack in the world. The attacker use abnormal activities to consume the system resource or to degrade the performance of network instead of intruding the system itself. Detection mechanisms are researched that are able to detect the abnormal activities when the attackers use the large amount of packets to break the system down in the development of DDoS. However, the changeable frequency mode will be the tendency in the future.
APA, Harvard, Vancouver, ISO, and other styles
38

Liu, Lei, X. L. Jin, Geyong Min, and L. Xu. "Anomaly diagnosis based on regression and classification analysis of statistical traffic features." 2013. http://hdl.handle.net/10454/10727.

Full text
Abstract:
No<br>Traffic anomalies caused by Distributed Denial-of-Service (DDoS) attacks are major threats to both network service providers and legitimate customers. The DDoS attacks regularly consume and exhaust the resources of victims and hence result in abnormal bursty traffic through end-user systems. Additionally, malicious traffic aggregated into normal traffic often show dramatic changes in the traffic nature and statistical features. This study focuses on early detection of traffic anomalies caused by DDoS attacks in light of analyzing the network traffic behavior. Key statistical features inc
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!