Journal articles on the topic 'DDoS-Protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'DDoS-Protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Reynolds, Roy. "It's time to rethink DDoS protection." Network Security 2020, no. 1 (January 2020): 6–8. http://dx.doi.org/10.1016/s1353-4858(20)30007-6.
Full textShah, Harshil, Priyansh Shah, and Swapna Naik. "DDOS Protection by Dividing and Limiting." International Journal of Computer Applications 155, no. 11 (December 15, 2016): 12–14. http://dx.doi.org/10.5120/ijca2016912251.
Full textEvglevskaya, N. V., A. Yu Zuev, A. O. Karasenko, and O. S. Lauta. "Comparative analysis of the effectiveness of existing methods of networks security from DDoS attacks." Radio industry (Russia) 30, no. 3 (September 8, 2020): 67–74. http://dx.doi.org/10.21778/2413-9599-2020-30-3-67-74.
Full textMahmood, Hassan, Danish Mahmood, Qaisar Shaheen, Rizwan Akhtar, and Wang Changda. "S-DPS: An SDN-Based DDoS Protection System for Smart Grids." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6629098.
Full textSelvakani, S., K. Vasumathi, T. Vijayalakshmi, and A. Kavitha. "Attack in SDN Based Distributed Denial of Service." Asian Journal of Engineering and Applied Technology 10, no. 1 (May 5, 2021): 38–44. http://dx.doi.org/10.51983/ajeat-2021.10.1.2802.
Full textRebecchi, Filippo, Julien Boite, Pierre-Alexis Nardin, Mathieu Bouet, and Vania Conan. "DDoS protection with stateful software-defined networking." International Journal of Network Management 29, no. 1 (August 9, 2018): e2042. http://dx.doi.org/10.1002/nem.2042.
Full textKhalaf, Bashar Ahmad, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak, Mohamed Elhoseny, and Adam Marks. "An Adaptive Protection of Flooding Attacks Model for Complex Network Environments." Security and Communication Networks 2021 (April 22, 2021): 1–17. http://dx.doi.org/10.1155/2021/5542919.
Full textSaleh, Mohammed A., and Azizah Abdul Manaf. "A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks." Scientific World Journal 2015 (2015): 1–19. http://dx.doi.org/10.1155/2015/238230.
Full textLe, Duc, Minh Dao, and Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN." Information and Control Systems, no. 3 (June 15, 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Full textJili, Tianwen, and Nanfeng Xiao. "DDoS Detection and Protection Based on Cloud Computing Platform." Journal of Physics: Conference Series 1621 (August 2020): 012005. http://dx.doi.org/10.1088/1742-6596/1621/1/012005.
Full textQudah, Zakaria Al, Basheer Al Duwairi, and Osama Al Khaleel. "DDoS protection as a service: hiding behind the giants." International Journal of Computational Science and Engineering 9, no. 4 (2014): 292. http://dx.doi.org/10.1504/ijcse.2014.060711.
Full textBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam, and Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Full textEt. al., Dr Shanti Rathore,. "Multipath Reliable Routing Using Cluster Based Communication." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3210–15. http://dx.doi.org/10.17762/turcomat.v12i2.2378.
Full textMazur, Katarzyna, Bogdan Ksiezopolski, and Radoslaw Nielek. "Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5017248.
Full textZhao, Yuntao, Wenbo Zhang, Yongxin Feng, and Bo Yu. "A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack." Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9463653.
Full textA. Naagas, M., E. L. Mique Jr, T. D. Palaoag, and J. S. Dela Cruz. "Defense-through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack." Bulletin of Electrical Engineering and Informatics 7, no. 4 (December 1, 2018): 593–600. http://dx.doi.org/10.11591/eei.v7i4.1349.
Full textJeyanthi, N., and P. C. Mogankumar. "A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks." Cybernetics and Information Technologies 14, no. 3 (September 1, 2014): 71–85. http://dx.doi.org/10.2478/cait-2014-0034.
Full textKim, Dae Hwan, and Soo Jin Lee. "A Method for Preemptive Intrusion Detection and Protection Against DDoS Attacks." Journal of the Korea society of IT services 15, no. 2 (June 30, 2016): 157–67. http://dx.doi.org/10.9716/kits.2016.15.2.157.
Full textKaur, Amarjeet, Gagandeep Kaur, and Gagandeep Kaur. "DdoS Attack Detection on Cloud Environment in Wireless Sensor Network: A Review." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 5 (June 2, 2018): 33. http://dx.doi.org/10.23956/ijarcsse.v8i5.662.
Full textTumbinskaya, Marina V., Vasily V. Vоlkоv, and Bulat G. Zagidullin. "Use of statistical methods for analysis and forecast of udp-flood attacks." Journal Of Applied Informatics 15, no. 89 (October 30, 2020): 85–102. http://dx.doi.org/10.37791/2687-0649-2020-15-5-85-102.
Full textHosny, Khalid Mohamed, Ameer El-Sayed Gouda, and Ehab Rushdy Mohamed. "New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks." International Journal of Sociotechnology and Knowledge Development 12, no. 2 (April 2020): 1–30. http://dx.doi.org/10.4018/ijskd.2020040101.
Full textBorisenko, Konstantin, Ivan Kholod, and Andrey Shorov. "Framework for Infrastructure Attack Modeling in Hybrid Networks." International Journal of Mobile Computing and Multimedia Communications 6, no. 4 (October 2014): 98–114. http://dx.doi.org/10.4018/ijmcmc.2014100106.
Full textKodada, Basappa B., Gaurav Prasad, and Alwyn R. Pais. "Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment." International Journal of Computer Network and Information Security 4, no. 7 (July 9, 2012): 12–18. http://dx.doi.org/10.5815/ijcnis.2012.07.02.
Full textFrancois, Jérôme, Issam Aib, and Raouf Boutaba. "FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks." IEEE/ACM Transactions on Networking 20, no. 6 (December 2012): 1828–41. http://dx.doi.org/10.1109/tnet.2012.2194508.
Full textBhardwaj, Akashdeep, and Sam Goundar. "Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks." International Journal of Cloud Applications and Computing 7, no. 3 (July 2017): 59–75. http://dx.doi.org/10.4018/ijcac.2017070103.
Full textBACHMANOV, DMITRIY A., ANDREY R. OCHEREDKO, MICHAEL M. PUTYATO, and ALEXANDER S. MAKARYAN. "RESEARCH OF THE ISSUES OF IMPROVEMENT OF PROTECTION SYSTEMS AGAINST DDOS-ATTACKS BASED ON THE COMPREHENSIVE ANALYSIS OF MODERN INTERACTION MECHANISMS." CASPIAN JOURNAL: Control and High Technologies 53, no. 1 (2021): 63–74. http://dx.doi.org/10.21672/2074-1707.2021.53.1.063-074.
Full textSerrano Mamolar, Ana, Pablo Salvá-García, Enrique Chirivella-Perez, Zeeshan Pervez, Jose M. Alcaraz Calero, and Qi Wang. "Autonomic protection of multi-tenant 5G mobile networks against UDP flooding DDoS attacks." Journal of Network and Computer Applications 145 (November 2019): 102416. http://dx.doi.org/10.1016/j.jnca.2019.102416.
Full textHaining Wang and K. G. Shin. "Transport-aware IP routers: A built-in protection mechanism to counter DDoS attacks." IEEE Transactions on Parallel and Distributed Systems 14, no. 9 (September 2003): 873–84. http://dx.doi.org/10.1109/tpds.2003.1233710.
Full text., Subhashini. "PROFILE BASED PROTECTION SCHEME AGAINST DDOS ATTACK IN WSN WITH DUAL CLUSTERING ALGORITHM." International Journal of Research in Engineering and Technology 04, no. 14 (April 25, 2015): 29–32. http://dx.doi.org/10.15623/ijret.2015.0414008.
Full textWang, Bing, Yao Zheng, Wenjing Lou, and Y. Thomas Hou. "DDoS attack protection in the era of cloud computing and Software-Defined Networking." Computer Networks 81 (April 2015): 308–19. http://dx.doi.org/10.1016/j.comnet.2015.02.026.
Full textWang, Li Hui. "Research on Security of P2P Technology." Applied Mechanics and Materials 644-650 (September 2014): 2826–29. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2826.
Full textAlatawi, Fahad. "Defense mechanisms against Distributed Denial of Service attacks: Comparative Review." Journal of Information Security and Cybercrimes Research 4, no. 1 (June 1, 2021): 81–94. http://dx.doi.org/10.26735/lqez4186.
Full textDake, Delali Kwasi, James Dzisi Gadze, Griffith Selorm Klogo, and Henry Nunoo-Mensah. "Multi-Agent Reinforcement Learning Framework in SDN-IoT for Transient Load Detection and Prevention." Technologies 9, no. 3 (June 29, 2021): 44. http://dx.doi.org/10.3390/technologies9030044.
Full textMaqbool, Zohaib, Raja Habib, Tariq Aziz, Asma Maqbool, and Oriba Altaf. "Internet Security Issues in Smart City Environment." Journal of Information Technology and Computing 1, no. 1 (December 31, 2020): 14–30. http://dx.doi.org/10.48185/jitc.v1i1.49.
Full textVellalacheruvu, Hari Krishna, and Sanjeev Kumar. "Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks." Journal of Information Security 02, no. 03 (2011): 131–38. http://dx.doi.org/10.4236/jis.2011.23013.
Full textQin, Yu, Jingbin Liu, Shijun Zhao, Dengguo Feng, and Wei Feng. "RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device." Security and Communication Networks 2020 (September 23, 2020): 1–14. http://dx.doi.org/10.1155/2020/8957641.
Full textIyengar, N. Ch S. N., and Gopinath Ganapathy. "Trilateral Trust Based Defense Mechanism against DDoS Attacks in Cloud Computing Environment." Cybernetics and Information Technologies 15, no. 2 (June 1, 2015): 119–40. http://dx.doi.org/10.1515/cait-2015-0033.
Full textSalva-Garcia, Pablo, Jose M. Alcaraz-Calero, Qi Wang, Jorge Bernal Bernabe, and Antonio Skarmeta. "5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks." Security and Communication Networks 2018 (December 10, 2018): 1–21. http://dx.doi.org/10.1155/2018/9291506.
Full textNgo, Duc-Minh, Cuong Pham-Quoc, and Tran Ngoc Thinh. "An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks." Security and Communication Networks 2018 (December 24, 2018): 1–14. http://dx.doi.org/10.1155/2018/9562801.
Full textGhasabi, Mozhgan, and Mahmood Deypir. "Using optimized statistical distances to confront distributed denial of service attacks in software defined networks." Intelligent Data Analysis 25, no. 1 (January 26, 2021): 155–76. http://dx.doi.org/10.3233/ida-194796.
Full textAlkahtani, Hasan, Theyazn H. H. Aldhyani, and Mohammed Al-Yaari. "Adaptive Anomaly Detection Framework Model Objects in Cyberspace." Applied Bionics and Biomechanics 2020 (December 9, 2020): 1–14. http://dx.doi.org/10.1155/2020/6660489.
Full textKovalenko, Ya I. "THE NEED TO IMPLEMENT AT THE LEGISLATIVE LEVEL MEANS OF PROTECTION OF THE RIGHT TO A DOMAIN NAME FROM DOS (DDOS) ATTACKS IN UKRAINE." Juridical scientific and electronic journal, no. 1 (2021): 84–87. http://dx.doi.org/10.32782/2524-0374/2021-1/18.
Full textZak, Michal, and J. Andrew Ware. "Cloud based Distributed Denial of Service Alleviation System." Annals of Emerging Technologies in Computing 4, no. 1 (January 1, 2020): 44–53. http://dx.doi.org/10.33166/aetic.2020.01.005.
Full textLakhno, Valerii, Andrii Blozva, Borys Husiev, Tetiana Osypova, and Yurii Matus. "INTEGRATION AND PROTECTION OF IOT DEVICES IN THE AVAILABLE INFRASTRUCTURE OF THE COMPUTER NETWORK OF THE EDUCATIONAL INSTITUTIONS." Cybersecurity: Education, Science, Technique 3, no. 11 (2021): 5–99. http://dx.doi.org/10.28925/2663-4023.2021.11.8599.
Full textIsiaka, Fatima M., Salihu Abdullahi Audu, and Mustafa Ahmed Umar. "Developing a fail-safe culture in a cyber environment using MySQL replication technique." International Journal of Crowd Science 4, no. 2 (April 4, 2020): 149–70. http://dx.doi.org/10.1108/ijcs-04-2018-0008.
Full textKlymash, M. M., O. M. Shpur, and N. V. Pelekh. "WEB SERVICE AVAILABILITY MONITORING IN DISTRIBUTED INFOCOMMUNICATION SYSTEMS." Visnyk Universytetu “Ukraina”, no. 1 (28) 2020 (2020): 137–50. http://dx.doi.org/10.36994/2707-4110-2020-1-28-12.
Full textIvanova, Xenia A. "Online voting as an element of cybersecurity of megacities." Law Enforcement Review 3, no. 2 (September 13, 2019): 31–37. http://dx.doi.org/10.24147/2542-1514.2019.3(2).31-37.
Full textAndrysiak, Tomasz, Łukasz Saganowski, Mirosław Maszewski, and Piotr Grad. "A DDoS Attacks Detection Based on Conditional Heteroscedastic Time Series Models." Image Processing & Communications 20, no. 1 (March 1, 2015): 23–33. http://dx.doi.org/10.1515/ipc-2015-0027.
Full textApiecionek, Łukasz, and Matusz Biedziak. "Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection." JUCS - Journal of Universal Computer Science 26, no. 11 (November 28, 2020): 1435–54. http://dx.doi.org/10.3897/jucs.2020.076.
Full textWani, Azka, and S. Revathi. "Ransomware protection in IoT using software defined networking." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 3166. http://dx.doi.org/10.11591/ijece.v10i3.pp3166-3175.
Full text