Journal articles on the topic 'Flooding attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Flooding attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Luong, Ngoc T., Tu T. Vo, and Doan Hoang. "FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2019 (January 10, 2019): 1–17. http://dx.doi.org/10.1155/2019/6869307.
Full textTung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (August 1, 2020): 1239. http://dx.doi.org/10.3390/electronics9081239.
Full textBaldev Singh, Dr, Dr S.N. Panda, and Dr Gurpinder Singh Samra. "Slow flooding attack detection in cloud using change point detection approach." International Journal of Engineering & Technology 7, no. 2.30 (May 29, 2018): 33. http://dx.doi.org/10.14419/ijet.v7i2.30.13459.
Full textRamanauskaitė, Simona, and Antanas Čenys. "STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS." Mokslas - Lietuvos ateitis 3, no. 1 (August 22, 2011): 20–24. http://dx.doi.org/10.3846/mla.2011.004.
Full textKhalaf, Bashar Ahmad, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak, Mohamed Elhoseny, and Adam Marks. "An Adaptive Protection of Flooding Attacks Model for Complex Network Environments." Security and Communication Networks 2021 (April 22, 2021): 1–17. http://dx.doi.org/10.1155/2021/5542919.
Full textJose, Ancy Sherin, Latha R. Nair, and Varghese Paul. "Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3837–65. http://dx.doi.org/10.47059/revistageintec.v11i4.2411.
Full textAbu Zant, Mahmoud, and Adwan Yasin. "Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)." Security and Communication Networks 2019 (March 28, 2019): 1–12. http://dx.doi.org/10.1155/2019/8249108.
Full textIslam, M. Mattah, Saifullah Shahid, Khush Bakhat Awar, Rashid Khan, and Muhammad Sohail. "Cyber-Security: Dos Attack Outcomes are Dangerous." European Journal of Electrical Engineering and Computer Science 5, no. 3 (June 16, 2021): 54–59. http://dx.doi.org/10.24018/ejece.2021.5.3.297.
Full textCheng, Hai Xiu, and Bi Zeng. "A Method Based on BP Neural Network to Detect SIP DOS Flooding Attack." Applied Mechanics and Materials 263-266 (December 2012): 2773–78. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2773.
Full textSun, Fei Xian, and Zhi Gang Wu. "Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness." Advanced Materials Research 181-182 (January 2011): 66–71. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.66.
Full textRahul, A., B. Suresh kumar, and S. K. Prashanth. "Detection of Intruders and Flooding in VoIP using IDS, Jacobson Fast and Hellinger Distance Algorithms." American Journal of Advanced Computing 1, no. 1 (January 1, 2020): 1–6. http://dx.doi.org/10.15864/ajac.1106.
Full textFurfaro, Angelo, Pasquale Pace, and Andrea Parise. "Facing DDoS bandwidth flooding attacks." Simulation Modelling Practice and Theory 98 (January 2020): 101984. http://dx.doi.org/10.1016/j.simpat.2019.101984.
Full textLakshminarayanan, Karthik, Daniel Adkins, Adrian Perrig, and Ion Stoica. "Taming IP packet flooding attacks." ACM SIGCOMM Computer Communication Review 34, no. 1 (January 2004): 45–50. http://dx.doi.org/10.1145/972374.972383.
Full textRao T, Srinivasa, Harsha G, Kiran V, and Hemanth Kumar K. "Dos flooding attack control in information-centric networks." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 303. http://dx.doi.org/10.14419/ijet.v7i1.1.9708.
Full textMowla, Nishat, Inshil Doh, and Kijoon Chae. "CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word." Computer Science and Information Systems 15, no. 1 (2018): 163–85. http://dx.doi.org/10.2298/csis170328044m.
Full textKumar, Manish, and Abhinav Bhandari. "Performance Evaluation of Web Server's Request Queue against AL-DDoS Attacks in NS-2." International Journal of Information Security and Privacy 11, no. 4 (October 2017): 29–46. http://dx.doi.org/10.4018/ijisp.2017100103.
Full textARFANUDIN, CITRA, Bambang Sugiantoro, and Yudi Prayudi. "ANALYSIS OF ROUTER ATTACK WITH SECURITY INFORMATION AND EVENT MANAGEMENT AND IMPLICATIONS IN INFORMATION SECURITY INDEX." Cyber Security dan Forensik Digital 2, no. 1 (July 5, 2019): 1–7. http://dx.doi.org/10.14421/csecurity.2019.2.1.1388.
Full textYu, Geng, Dong Fang Yuan, Yan Cui, Ying Dong Wang, and Ping Zong. "Research on Robustness of Typically Opportunistic Network Routing Algorithm under Flooding Attack." Advanced Materials Research 989-994 (July 2014): 2227–31. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2227.
Full textChou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen, and Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.
Full textLee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (July 20, 2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.
Full textGanpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.
Full textAlasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.
Full textAlmaslukh, Bandar. "An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks." Security and Communication Networks 2020 (August 5, 2020): 1–11. http://dx.doi.org/10.1155/2020/8840058.
Full textSINGH, SATWINDER, ABHINAV BHANDARI, KRISHAN KUMAR SALUJA, and A. L. SANGAL. "Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks." International Journal of Computer Networks and Communications Security 8, no. 1 (January 31, 2020): 1–9. http://dx.doi.org/10.47277/ijcncs/8(1)1.
Full textMahapatra, Bandana, and Srikanta Patnaik. "Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent System in MANETS." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 2 (April 1, 2017): 919. http://dx.doi.org/10.11591/ijece.v7i2.pp919-925.
Full textAzis, Muhammad Misbahul, Yufiz Azhar, and Syaifuddin Syaifuddin. "Analisa Sistem Identifikasi DDoS Menggunakan KNN Pada Jaringan Software Defined Network(SDN)." Jurnal Repositor 2, no. 7 (May 31, 2020): 915. http://dx.doi.org/10.22219/repositor.v2i7.762.
Full textWANG, Shang-Guang, Qi-Bo SUN, and Fang-Chun YANG. "Detecting SIP Flooding Attacks Against IMS Network." Journal of Software 22, no. 4 (June 21, 2011): 761–72. http://dx.doi.org/10.3724/sp.j.1001.2011.03818.
Full textXue, Lei, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, Tony T. N. Miu, and Guofei Gu. "LinkScope: Toward Detecting Target Link Flooding Attacks." IEEE Transactions on Information Forensics and Security 13, no. 10 (October 2018): 2423–38. http://dx.doi.org/10.1109/tifs.2018.2815555.
Full textMink, Dustin M., Jeffrey McDonald, Sikha Bagui, William B. Glisson, Jordan Shropshire, Ryan Benton, and Samuel Russ. "Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B." Big Data and Cognitive Computing 5, no. 2 (June 16, 2021): 27. http://dx.doi.org/10.3390/bdcc5020027.
Full textAnugrah, Ino, and Raden Hengki Rahmanto. "Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 5, no. 2 (February 25, 2018): 91–106. http://dx.doi.org/10.33558/piksel.v5i2.271.
Full textNazih, Waleed, Yasser Hifny, Wail Elkilani, Tamer Abdelkader, and Hossam Faheem. "Efficient Detection of Attacks in SIP Based VoIP Networks Using Linear l1-SVM Classifier." International Journal of Computers Communications & Control 14, no. 4 (August 5, 2019): 518–29. http://dx.doi.org/10.15837/ijccc.2019.4.3563.
Full textDhanapal A and Nithyanandam P. "The HTTP Flooding Attack Detection to Secure and Safeguard Online Applications in the Cloud." International Journal of Information System Modeling and Design 10, no. 3 (July 2019): 41–58. http://dx.doi.org/10.4018/ijismd.2019070103.
Full textGhazali. "Flooding Distributed Denial of Service Attacks-A Review." Journal of Computer Science 7, no. 8 (August 1, 2011): 1218–23. http://dx.doi.org/10.3844/jcssp.2011.1218.1223.
Full textAl-Allouni, H., A. Rohiem, M. Hashem, and A. El-moghazy. "Problems of SIP Flooding Attacks Anomaly Detection Algorithms." International Conference on Electrical Engineering 7, no. 7 (May 1, 2010): 1–14. http://dx.doi.org/10.21608/iceeng.2010.33241.
Full textJian Yuan and K. Mills. "Monitoring the Macroscopic Effect of DDoS Flooding Attacks." IEEE Transactions on Dependable and Secure Computing 2, no. 4 (October 2005): 324–35. http://dx.doi.org/10.1109/tdsc.2005.50.
Full textYeung, Daniel S., Shuyuan Jin, and Xizhao Wang. "Covariance-Matrix Modeling and Detecting Various Flooding Attacks." IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans 37, no. 2 (March 2007): 157–69. http://dx.doi.org/10.1109/tsmca.2006.889480.
Full textBaik, Namkyun, and Namhi Kang. "Multi-Phase Detection of Spoofed SYN Flooding Attacks." International Journal of Grid and Distributed Computing 11, no. 3 (March 31, 2018): 23–32. http://dx.doi.org/10.14257/ijgdc.2018.11.3.03.
Full textWang, Shangguang, Qibo Sun, Hua Zou, and Fangchun Yang. "Detecting SYN flooding attacks based on traffic prediction." Security and Communication Networks 5, no. 10 (February 24, 2012): 1131–40. http://dx.doi.org/10.1002/sec.428.
Full textAlsulaiman, Lama, and Saad Al-Ahmadi. "Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network." International Journal of Network Security & Its Applications 13, no. 2 (March 31, 2021): 21–29. http://dx.doi.org/10.5121/ijnsa.2021.13202.
Full textBdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam, and Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.
Full textBi, Jia Na, and E. Xu. "A Secure and Energy-Efficient Rooting Protocol for WSN." Applied Mechanics and Materials 347-350 (August 2013): 1699–704. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1699.
Full textJatmika, Andy Hidayat, I. Made Windra Yudistiana, and Ariyan Zubaidi. "Analisis Optimasi Kinerja Protokol Routing AODV dan AOMDV dengan Menggunakan Metode RFAP untuk Mencegah RREQ Flooding Attacks pada Jaringan MANET." Jurnal Teknologi Informasi, Komputer, dan Aplikasinya (JTIKA ) 1, no. 1 (March 26, 2019): 9–18. http://dx.doi.org/10.29303/jtika.v1i1.13.
Full textElsherif, Ahmed A., and Arwa A. Aldaej. "DDOS Botnets Attacks Detection in Anomaly Traffic: A Comparative Study." Journal of Information Security and Cybercrimes Research 3, no. 1 (November 20, 2020): 64–74. http://dx.doi.org/10.26735/zrxn1433.
Full textPoongodi, M., and S. Bose. "A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks." International Journal of Information Security and Privacy 8, no. 2 (April 2014): 1–18. http://dx.doi.org/10.4018/ijisp.2014040101.
Full textLutscher, Philipp M., Nils B. Weidmann, Margaret E. Roberts, Mattijs Jonker, Alistair King, and Alberto Dainotti. "At Home and Abroad: The Use of Denial-of-service Attacks during Elections in Nondemocratic Regimes." Journal of Conflict Resolution 64, no. 2-3 (July 25, 2019): 373–401. http://dx.doi.org/10.1177/0022002719861676.
Full textZhao, Min, Danyang Qin, Ruolin Guo, and Guangchao Xu. "Efficient Protection Mechanism Based on Self-Adaptive Decision for Communication Networks of Autonomous Vehicles." Mobile Information Systems 2020 (June 10, 2020): 1–9. http://dx.doi.org/10.1155/2020/2168086.
Full textJaideep, Gera, and Bhanu Prakash Battula. "Detection of DDOS attacks in distributed peer to peer networks." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 1051. http://dx.doi.org/10.14419/ijet.v7i2.7.12227.
Full textPonnuviji, N. P., and M. Vigilson Prem. "An Enhanced Way of Distributed Denial of Service Attack Detection by Applying Machine Learning Algorithms in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 8 (August 1, 2020): 3765–69. http://dx.doi.org/10.1166/jctn.2020.9317.
Full textHsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung, and YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor." Sensors 21, no. 6 (March 11, 2021): 1980. http://dx.doi.org/10.3390/s21061980.
Full textArgyraki, K., and D. R. Cheriton. "Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks." IEEE/ACM Transactions on Networking 17, no. 4 (August 2009): 1284–97. http://dx.doi.org/10.1109/tnet.2008.2007431.
Full text