Journal articles on the topic 'Distributed Denial of Service Attacks (DDoS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Distributed Denial of Service Attacks (DDoS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kotey, Seth, Eric Tchao, and James Gadze. "On Distributed Denial of Service Current Defense Schemes." Technologies 7, no. 1 (January 30, 2019): 19. http://dx.doi.org/10.3390/technologies7010019.
Full textSambangi, Swathi, and Lakshmeeswari Gondi. "A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression." Proceedings 63, no. 1 (December 25, 2020): 51. http://dx.doi.org/10.3390/proceedings2020063051.
Full textK.M, Akhil, Rahul C.T, and Athira V.B. "Distributed Denial of Service (DDoS) Attacks and Defence Mechanism." International Journal of Computer Science and Mobile Computing 10, no. 3 (March 30, 2021): 83–88. http://dx.doi.org/10.47760/ijcsmc.2021.v10i03.010.
Full textSingh, Rajeev, and T. P. Sharma. "Present Status of Distributed Denial of Service (DDoS) Attacks in Internet World." International Journal of Mathematical, Engineering and Management Sciences 4, no. 4 (August 1, 2019): 1008–17. http://dx.doi.org/10.33889/ijmems.2019.4.4-080.
Full textMazur, Katarzyna, Bogdan Ksiezopolski, and Radoslaw Nielek. "Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5017248.
Full textAsad, Muhammad, Muhammad Asim, Talha Javed, Mirza O. Beg, Hasan Mujtaba, and Sohail Abbas. "DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning." Computer Journal 63, no. 7 (July 3, 2019): 983–94. http://dx.doi.org/10.1093/comjnl/bxz064.
Full textDhanapal, A., and P. Nithyanandam. "The Slow HTTP Distributed Denial of Service Attack Detection in Cloud." Scalable Computing: Practice and Experience 20, no. 2 (May 2, 2019): 285–98. http://dx.doi.org/10.12694/scpe.v20i2.1501.
Full textZeebaree, Subhi R. M., Karzan H. Sharif, and Roshna M. Mohammed Amin. "Application Layer Distributed Denial of Service Attacks Defense Techniques : A review." Academic Journal of Nawroz University 7, no. 4 (December 21, 2018): 113. http://dx.doi.org/10.25007/ajnu.v7n4a279.
Full textAlosaimi, Wael, Michal Zak, Khalid Al-Begain, Roobaea Alroobaea, and Mehedi Masud. "Mitigation of Distributed Denial of Service Attacks in the Cloud." Cybernetics and Information Technologies 17, no. 4 (November 27, 2017): 32–51. http://dx.doi.org/10.1515/cait-2017-0040.
Full textAkanji, Oluwatobi Shadrach, Opeyemi Aderiike Abisoye, and Mohammed Awwal Iliyasu. "MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS." Journal of Information and Communication Technology 20, Number 3 (June 11, 2021): 277–304. http://dx.doi.org/10.32890/jict2021.20.3.1.
Full textZhang, Chunming. "Impact of Defending Strategy Decision on DDoS Attack." Complexity 2021 (March 15, 2021): 1–11. http://dx.doi.org/10.1155/2021/6694383.
Full textSaleh, Mohammed A., and Azizah Abdul Manaf. "A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks." Scientific World Journal 2015 (2015): 1–19. http://dx.doi.org/10.1155/2015/238230.
Full textShurman, Mohammad, Rami Khrais, and Abdulrahman Yateem. "DoS and DDoS Attack Detection Using Deep Learning and IDS." International Arab Journal of Information Technology 17, no. 4A (July 31, 2020): 655–61. http://dx.doi.org/10.34028/iajit/17/4a/10.
Full textAlatawi, Fahad. "Defense mechanisms against Distributed Denial of Service attacks: Comparative Review." Journal of Information Security and Cybercrimes Research 4, no. 1 (June 1, 2021): 81–94. http://dx.doi.org/10.26735/lqez4186.
Full textSharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." International Journal of E-Services and Mobile Applications 10, no. 2 (April 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.
Full textZhang, Jian, Qidi Liang, Rui Jiang, and Xi Li. "A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors." Applied Sciences 9, no. 21 (October 31, 2019): 4633. http://dx.doi.org/10.3390/app9214633.
Full textSINGH, SATWINDER, ABHINAV BHANDARI, KRISHAN KUMAR SALUJA, and A. L. SANGAL. "Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks." International Journal of Computer Networks and Communications Security 8, no. 1 (January 31, 2020): 1–9. http://dx.doi.org/10.47277/ijcncs/8(1)1.
Full textDwivedi, Shubhra, Manu Vardhan, and Sarsij Tripathi. "Distributed Denial-of-Service Prediction on IoT Framework by Learning Techniques." Open Computer Science 10, no. 1 (August 3, 2020): 220–30. http://dx.doi.org/10.1515/comp-2020-0009.
Full textWani, Sharyar, Mohammed Imthiyas, Hamad Almohamedh, Khalid M. Alhamed, Sultan Almotairi, and Yonis Gulzar. "Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight." Symmetry 13, no. 2 (January 29, 2021): 227. http://dx.doi.org/10.3390/sym13020227.
Full textkumarasamy, Saravanan. "Distributed Denial of Service (DDOS) Attacks Detection Mechanism." International Journal of Computer Science, Engineering and Information Technology 1, no. 5 (December 31, 2011): 39–49. http://dx.doi.org/10.5121/ijcseit.2011.1504.
Full textMladenov, Branislav, and Georgi Iliev. "Optimal software-defined network topology for distributed denial of service attack mitigation." Bulletin of Electrical Engineering and Informatics 9, no. 6 (December 1, 2020): 2588–94. http://dx.doi.org/10.11591/eei.v9i6.2581.
Full textVasan Sai Krishna, C., Y. Bhuvana, P. Pavan Kumar, and R. Murugan. "Reducing distributed denial of service (DDoS) attacks using client puzzle mechanism." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 230. http://dx.doi.org/10.14419/ijet.v7i1.1.9473.
Full textFadlil, Abdul, Imam Riadi, and Sukma Aji. "Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Network Forensics." Bulletin of Electrical Engineering and Informatics 6, no. 2 (June 1, 2017): 140–48. http://dx.doi.org/10.11591/eei.v6i2.605.
Full textWang, Qi, Wei Tai, Yi Tang, Hong Zhu, Ming Zhang, and Dongxu Zhou. "Coordinated Defense of Distributed Denial of Service Attacks against the Multi-Area Load Frequency Control Services." Energies 12, no. 13 (June 28, 2019): 2493. http://dx.doi.org/10.3390/en12132493.
Full textAdhikary, Kaushik, Shashi Bhushan, Sunil Kumar, and Kamlesh Dutta. "Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks." International Journal of Security and Privacy in Pervasive Computing 12, no. 4 (October 2020): 1–18. http://dx.doi.org/10.4018/ijsppc.2020100101.
Full textAgha, Sahareesh, Osama Rehman, and Ibrahim M. H. Rahman. "Improving Discriminating Accuracy Rate of DDoS Attacks and Flash Events." International Journal of Cyber Warfare and Terrorism 11, no. 4 (October 2021): 21–42. http://dx.doi.org/10.4018/ijcwt.2021100102.
Full textBhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (June 6, 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Full textHosny, Khalid Mohamed, Ameer El-Sayed Gouda, and Ehab Rushdy Mohamed. "New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks." International Journal of Sociotechnology and Knowledge Development 12, no. 2 (April 2020): 1–30. http://dx.doi.org/10.4018/ijskd.2020040101.
Full textBravo, Silvia, and David Mauricio. "New Features of User’s Behavior to Distributed Denial of Service Attacks Detection in Application Layer." International Journal of Online and Biomedical Engineering (iJOE) 14, no. 12 (December 23, 2018): 164. http://dx.doi.org/10.3991/ijoe.v14i12.9439.
Full textPonnuviji, N. P., and M. Vigilson Prem. "An Enhanced Way of Distributed Denial of Service Attack Detection by Applying Machine Learning Algorithms in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 8 (August 1, 2020): 3765–69. http://dx.doi.org/10.1166/jctn.2020.9317.
Full textAsia Ayaz Andrabi, Syed, Sachi Pandey, and Akthar Nazir. "A review on mitigation of the DDoS Attack in cloud in regulated environment." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 497. http://dx.doi.org/10.14419/ijet.v7i2.8.10492.
Full textEl-Sofany, Hosam F., and Samir Abou El-Seoud. "Performance Analysis of an Effective Approach to Protect Cloud Systems against Application Layer Based Attacks." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 03 (February 14, 2019): 82. http://dx.doi.org/10.3991/ijoe.v15i03.9931.
Full textLin, Hsiao-Chung, Ping Wang, and Wen-Hui Lin. "Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks." Computers 8, no. 4 (December 4, 2019): 88. http://dx.doi.org/10.3390/computers8040088.
Full textLi, Ming, and Wei Zhao. "Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack." Mathematical Problems in Engineering 2008 (2008): 1–11. http://dx.doi.org/10.1155/2008/475878.
Full textKhairi, M. H. H., S. H. S. Ariffin, N. M. Abdul Latiff, A. S. Abdullah, and M. K. Hassan. "A Review of Anomaly Detection Techniques and Distributed Denial of Service (DDoS) on Software Defined Network (SDN)." Engineering, Technology & Applied Science Research 8, no. 2 (April 19, 2018): 2724–30. http://dx.doi.org/10.48084/etasr.1840.
Full textNaha, Bibek, Siddhartha Banerjee, and Sayanti Mondal. "A SURVEY ON CLOUD-DENIAL OF SERVICE." American Journal of Advanced Computing 1, no. 2 (April 1, 2020): 1–5. http://dx.doi.org/10.15864/ajac.1205.
Full textLi, Muhai, and Ming Li. "An Adaptive Approach for Defending against DDoS Attacks." Mathematical Problems in Engineering 2010 (2010): 1–15. http://dx.doi.org/10.1155/2010/570940.
Full textJaafar, Ghafar A., Shahidan M. Abdullah, and Saifuladli Ismail. "Review of Recent Detection Methods for HTTP DDoS Attack." Journal of Computer Networks and Communications 2019 (January 10, 2019): 1–10. http://dx.doi.org/10.1155/2019/1283472.
Full textDouglas, David, José Jair Santanna, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville, and Aiko Pras. "Booters: can anything justify distributed denial-of-service (DDoS) attacks for hire?" Journal of Information, Communication and Ethics in Society 15, no. 01 (March 13, 2017): 90–104. http://dx.doi.org/10.1108/jices-09-2016-0033.
Full textGupta, Shaveta, Dinesh Grover, and Abhinav Bhandari. "Vulnerability Analysis of Existing Distributed Denial of Service (DDoS) Defense Frameworks." Asian Journal of Computer Science and Technology 7, no. 3 (November 5, 2018): 62–67. http://dx.doi.org/10.51983/ajcst-2018.7.3.1895.
Full textAbdelhaq, Maha, Raed Alsaqour, Mada Alaskar, Fayza Alotaibi, Rawan Almutlaq, Bushra Alghamdi, Bayan Alhammad, Malak Sehaibani, and Donia Moyna. "The resistance of routing protocols against DDOS attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 4844. http://dx.doi.org/10.11591/ijece.v10i5.pp4844-4852.
Full textAL-Adaileh, Mohammad A., Mohammed Anbar, Yung-Wey Chong, and Ahmed Al-Ani. "Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS)." MATEC Web of Conferences 218 (2018): 02012. http://dx.doi.org/10.1051/matecconf/201821802012.
Full textKhalaf, Bashar Ahmad, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak, Mohamed Elhoseny, and Adam Marks. "An Adaptive Protection of Flooding Attacks Model for Complex Network Environments." Security and Communication Networks 2021 (April 22, 2021): 1–17. http://dx.doi.org/10.1155/2021/5542919.
Full textPrayogo, Oldy Ray, and Imam Riadi. "Router Forensic Analysis against Distributed Denial of Service (DDoS) Attacks." International Journal of Computer Applications 175, no. 39 (December 30, 2020): 19–25. http://dx.doi.org/10.5120/ijca2020920944.
Full textSelvakani, S., K. Vasumathi, T. Vijayalakshmi, and A. Kavitha. "Attack in SDN Based Distributed Denial of Service." Asian Journal of Engineering and Applied Technology 10, no. 1 (May 5, 2021): 38–44. http://dx.doi.org/10.51983/ajeat-2021.10.1.2802.
Full textHan, Dezhi, Kun Bi, Han Liu, and Jianxin Jia. "A DDoS attack detection system based on spark framework." Computer Science and Information Systems 14, no. 3 (2017): 769–88. http://dx.doi.org/10.2298/csis161217028h.
Full textEl-Sofany, Hosam, and Samir Abou El-Seoud. "A Novel Model for Securing Mobile-based Systems against DDoS Attacks in Cloud Computing Environment." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 01 (January 29, 2019): 85. http://dx.doi.org/10.3991/ijim.v13i01.9900.
Full textRodrigues, Bruno, Eder Scheid, Christian Killer, Muriel Franco, and Burkhard Stiller. "Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks." Journal of Network and Systems Management 28, no. 4 (August 24, 2020): 953–89. http://dx.doi.org/10.1007/s10922-020-09559-4.
Full textKong, Bin, Kun Yang, Degang Sun, Meimei Li, and Zhixin Shi. "Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches." Computer Science and Information Systems 14, no. 3 (2017): 839–56. http://dx.doi.org/10.2298/csis161230032k.
Full textS. Abdulkarem, Huda, and Ammar D. Alethawy. "DDOS ATTACK DETECTION AND MITIGATION AT SDN ENVIROMENT." Iraqi Journal of Information & Communications Technology 4, no. 1 (May 3, 2021): 1–9. http://dx.doi.org/10.31987/ijict.4.1.115.
Full text