Academic literature on the topic 'Flooding attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Flooding attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Flooding attack"
Khalaf, Bashar Ahmad, Salama A. Mostafa, Aida Mustapha, et al. "An Adaptive Protection of Flooding Attacks Model for Complex Network Environments." Security and Communication Networks 2021 (April 22, 2021): 1–17. http://dx.doi.org/10.1155/2021/5542919.
Full textHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (2021): 12514. http://dx.doi.org/10.3390/su132212514.
Full textAbu Zant, Mahmoud, and Adwan Yasin. "Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)." Security and Communication Networks 2019 (March 28, 2019): 1–12. http://dx.doi.org/10.1155/2019/8249108.
Full textRamanauskaitė, Simona, and Antanas Čenys. "STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS." Mokslas - Lietuvos ateitis 3, no. 1 (2011): 20–24. http://dx.doi.org/10.3846/mla.2011.004.
Full textCheng, Hai Xiu, and Bi Zeng. "A Method Based on BP Neural Network to Detect SIP DOS Flooding Attack." Applied Mechanics and Materials 263-266 (December 2012): 2773–78. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2773.
Full textBaldev Singh, Dr, Dr S.N. Panda, and Dr Gurpinder Singh Samra. "Slow flooding attack detection in cloud using change point detection approach." International Journal of Engineering & Technology 7, no. 2.30 (2018): 33. http://dx.doi.org/10.14419/ijet.v7i2.30.13459.
Full textLuong, Ngoc T., Tu T. Vo, and Doan Hoang. "FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2019 (January 10, 2019): 1–17. http://dx.doi.org/10.1155/2019/6869307.
Full textSaragih, Naikson, Ridho Agus Wery Nanda Panjaitan, and Mufria Jonatan Purba. "FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS." Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) 6, no. 2 (2023): 28–34. http://dx.doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932.
Full textL, Sheeba, and Meenakshi V S. "“HYBRID NODE WATCHING TECHNIQUE BASED DOS FLOODING ATTACK DETECTION IN WIRELESS SENSOR NETWORK." ICTACT Journal on Communication Technology 11, no. 4 (2020): 2292–300. https://doi.org/10.21917/ijct.2020.0339.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textDissertations / Theses on the topic "Flooding attack"
Margotta, Fabrizio. "DoS and DDoS attacks in Named Data Networking." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21855/.
Full textDudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.
Full textYou, Yonghua. "A defense framework for flooding-based DDoS attacks." Thesis, Kingston, Ont. : [s.n.], 2007. http://hdl.handle.net/1974/653.
Full textMakke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Thesis, Paris 5, 2014. http://www.theses.fr/2014PA05S006/document.
Full textKang, Min Suk. "Handling Large-Scale Link-Flooding Attacks in the Internet." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/833.
Full textLee, Soo Bum. "Localizing the effects of link flooding attacks in the internet." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/10052.
Full textAkbar, Yousef M. A. H. "Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98554.
Full textSignorello, Salvatore. "A multifold approach to address the security issues of stateful forwarding mechanisms in Information-Centric Networks." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0109/document.
Full textBediako, Peter Ken. "Long Short-Term Memory Recurrent Neural Network for detecting DDoS flooding attacks within TensorFlow Implementation framework." Thesis, Luleå tekniska universitet, Datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-66802.
Full textMakke, Ali. "Détection d'attaques dans un système WBAN de surveillance médicale à distance." Electronic Thesis or Diss., Paris 5, 2014. http://www.theses.fr/2014PA05S006.
Full textBook chapters on the topic "Flooding attack"
Tang, Jin, and Yu Cheng. "SIP Flooding Attack Detection." In Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8996-2_4.
Full textNalayini, C. M., and Jeevaa Katiravan. "Block Link Flooding Algorithm for TCP SYN Flooding Attack." In International Conference on Computer Networks and Communication Technologies. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_83.
Full textShin, Seung-won, Ki-young Kim, and Jong-soo Jang. "LSAD: Lightweight SYN Flooding Attack Detector." In Distributed Computing and Internet Technology. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30555-2_45.
Full textSebastian, Bosco, Paromita Choudhury, and C. D. Jaidhar. "Mechanism for Preventing Registration Flooding Attack in SIP." In Intelligent Computing, Networking, and Informatics. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_71.
Full textBoro, Debojit, Himant Basumatary, Tribeni Goswami, and Dhruba K. Bhattacharyya. "UDP Flooding Attack Detection Using Information Metric Measure." In Advances in Intelligent Systems and Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0129-1_16.
Full textChoi, Yang-seo, Ik-Kyun Kim, Jin-Tae Oh, and Jong-Soo Jang. "AIGG Threshold Based HTTP GET Flooding Attack Detection." In Information Security Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35416-8_19.
Full textXie, Lixia, Ying Ding, and Hongyu Yang. "Mitigating Link-Flooding Attack with Segment Rerouting in SDN." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_6.
Full textVeigner, Christian, and Chunming Rong. "Flooding Attack on the Binding Cache in Mobile IPv6." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-75993-5_16.
Full textWadhwani, Priyanka, and Sourabh Singh Verma. "Analysing Performance Disruption of MANET Under Explicit Flooding Attack Frequency." In Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30927-9_6.
Full textLiu, Xinyu, Beumjin Cho, and Jong Kim. "SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN." In Information Security Applications. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56549-1_3.
Full textConference papers on the topic "Flooding attack"
Jupriyadi, Ridha Muldina Negara, Eueung Mulyana, and Nana Rachmana Syambas. "The Impact of Collusive Interest Flooding Attack on NDN Network Performance." In 2024 10th International Conference on Wireless and Telematics (ICWT). IEEE, 2024. http://dx.doi.org/10.1109/icwt62080.2024.10674740.
Full textMounika, V., N. Raghavendra Sai, Vasantha Bhavani, and P. S. V. S. Sridhar. "Expression of Concern for: Interest Flooding Attack Detection Method in NDN Networks." In 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2021. http://dx.doi.org/10.1109/icosec51865.2021.10702908.
Full textChen, Kun-Chih Jimmy, and Li-Heng Billy Ke. "Two-level Verification-Based Defense Mechanism for Flooding Attack on NoC Systems." In 2024 17th IEEE/ACM International Workshop on Network on Chip Architectures (NoCArc). IEEE, 2024. http://dx.doi.org/10.1109/nocarc64615.2024.10749951.
Full textLi, Yue, Runcheng Fang, Qipeng Song, and Xilei Yang. "STGCN-Based Link Flooding Attack Detection and Mitigation in Software-Defined Network." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00068.
Full textM, Kiruthika, Lalitha Krishnasamy, Prithi Samuel, and Kaavya Kanagaraj. "FADA: Flooding Attack Defense AODV Protocol to counter Flooding Attack in MANET." In 2023 IEEE Fifth International Conference on Advances in Electronics, Computers and Communications (ICAECC). IEEE, 2023. http://dx.doi.org/10.1109/icaecc59324.2023.10560115.
Full text"Defense Against TCP Flooding Attack." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2012. http://dx.doi.org/10.5220/0004119604160420.
Full textSana, Akourmis, Fakhri Youssef, and Rahmani Moulay Driss. "FLOODING ATTACK ON AODV IN WSN." In 2018 Renewable Energies, Power Systems & Green Inclusive Economy (REPS-GIE). IEEE, 2018. http://dx.doi.org/10.1109/repsgie.2018.8488836.
Full textGeetha, K., and N. Sreenath. "SYN flooding attack — Identification and analysis." In 2014 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, 2014. http://dx.doi.org/10.1109/icices.2014.7033828.
Full textPurwanto, Yudha, Kuspriyanto, Hendrawan, and Budi Rahardjo. "Traffic anomaly detection in DDos flooding attack." In 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA). IEEE, 2014. http://dx.doi.org/10.1109/tssa.2014.7065953.
Full textNagrath, Preeti, Sandhya Aneja, and G. N. Purohit. "Defending flooding attack in Delay Tolerant Networks." In 2015 International Conference on Information Networking (ICOIN). IEEE, 2015. http://dx.doi.org/10.1109/icoin.2015.7057854.
Full textReports on the topic "Flooding attack"
Eddy, W. TCP SYN Flooding Attacks and Common Mitigations. RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4987.
Full textLee, Soo B., and Virgil D. Gligor. FLoc : Dependable Link Access for Legitimate Traffic in Flooding Attacks. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada580050.
Full textLee, Soo B., and Virgil D. Gligor. FLoc: Dependable Link Access for Legitimate Traffic in Flooding Attacks. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada582042.
Full textRamanujan, Ranga S., Doug Harper, Maher Kaddoura, David Baca, John Wu, and Kevin Millikin. Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada436292.
Full text