Journal articles on the topic 'Flooding distributed denial of service attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Flooding distributed denial of service attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.
Full textAli, Raza. "Detection of DDoS attack in cloud computing and its prevention: a systematic review." i-manager’s Journal on Cloud Computing 9, no. 1 (2022): 1. http://dx.doi.org/10.26634/jcc.9.1.18542.
Full textNashat, Dalia, Fatma A. Hussain, and Xiaohong Jiang. "Detection of Distributed Denial of Service Flooding Attack Using Odds Ratio." Journal of Networking and Network Applications 1, no. 2 (2021): 67–74. http://dx.doi.org/10.33969/j-nana.2021.010204.
Full textGhazali. "Flooding Distributed Denial of Service Attacks-A Review." Journal of Computer Science 7, no. 8 (2011): 1218–23. http://dx.doi.org/10.3844/jcssp.2011.1218.1223.
Full textSINGH, SATWINDER, ABHINAV BHANDARI, KRISHAN KUMAR SALUJA, and A. L. SANGAL. "Study to Validate the Performance of Flooding Based Distributed Denial of Service Attacks." International Journal of Computer Networks and Communications Security 8, no. 1 (2020): 1–9. http://dx.doi.org/10.47277/ijcncs/8(1)1.
Full textRamli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.
Full textR., Ramkumar, Rahul R., and Gowtham Sri. "Anomaly Based Approach for Defending Denial of Service Attack in Web Traffic." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 04 (2015): 1657–64. https://doi.org/10.5281/zenodo.14776346.
Full textKhalaf, Bashar Ahmad, Salama A. Mostafa, Aida Mustapha, et al. "An Adaptive Protection of Flooding Attacks Model for Complex Network Environments." Security and Communication Networks 2021 (April 22, 2021): 1–17. http://dx.doi.org/10.1155/2021/5542919.
Full textSaurabh Kansal. "DISTRIBUTED DENIAL OF SERVICE ATTACK MITIGATION USING REINFORCEMENT LEARNING." Journal of Sustainable Solutions 2, no. 1 (2025): 11–18. https://doi.org/10.36676/j.sust.sol.v2.i1.54.
Full textNarote, Prof Amit, Vamika Zutshi, Aditi Potdar, and Radhika Vichare. "D-Dos Attack Prediction Using Machine Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Full textCheema, Ammarah, Moeenuddin Tariq, Adnan Hafiz, Muhammad Murad Khan, Fahad Ahmad, and Muhammad Anwar. "Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review." Security and Communication Networks 2022 (May 20, 2022): 1–15. http://dx.doi.org/10.1155/2022/8379532.
Full textDr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.
Full textAsaolu, Opeyemi Oreoluwa, Oluwasanmi Segun Adanigbo, Afeez Adekunle Soladoye, and Nnamdi Stephen Okomba. "Principal Component Analysis-Multilinear Perceptron-based model for Distributed Denial of Service Attack Mitigation." ABUAD Journal of Engineering Research and Development (AJERD) 8, no. 2 (2025): 14–24. https://doi.org/10.53982/ajerd.2025.0802.02-j.
Full textMazur, Katarzyna, Bogdan Ksiezopolski, and Radoslaw Nielek. "Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5017248.
Full textNarote, Prof Amit, Vamika Zutshi, Aditi Potdar, and Radhika Vichare. "Detection of DDoS Attacks using Concepts of Machine Learning." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 390–94. http://dx.doi.org/10.22214/ijraset.2022.43723.
Full textC. Remegio, Florlyn Mae, and Cristina E. Dumdumaya. "Distributed Denial of service attack mitigation and approaches: a literature review." International Journal Artificial Intelligent and Informatics 2, no. 2 (2022): 86–97. http://dx.doi.org/10.33292/ijarlit.v2i2.39.
Full textPunarselvam, Dr E. "Blocking Distributed Denial of Service Flooding Attacks with Dynamic Path Detectors." International Journal for Research in Applied Science and Engineering Technology 8, no. 6 (2020): 1318–22. http://dx.doi.org/10.22214/ijraset.2020.6212.
Full textLuo, Hongbin, Zhe Chen, Jiawei Li, and Athanasios V. Vasilakos. "Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers." IEEE Transactions on Information Forensics and Security 12, no. 8 (2017): 1801–15. http://dx.doi.org/10.1109/tifs.2017.2688414.
Full textLi, Ming, Chi-Hung Chi, Weijia Jia, et al. "Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks." International Journal of Information Technology & Decision Making 02, no. 03 (2003): 397–405. http://dx.doi.org/10.1142/s0219622003000720.
Full textChang, R. K. C. "Defending against flooding-based distributed denial-of-service attacks: a tutorial." IEEE Communications Magazine 40, no. 10 (2002): 42–51. http://dx.doi.org/10.1109/mcom.2002.1039856.
Full textMarcelo, I. P. Salas. "Attack Taxonomy Methodology Applied to Web Services." Latin-American Journal of Computing 11, no. 1 (2024): 66–79. https://doi.org/10.5281/zenodo.10402238.
Full textAlhammadi, Nafea A. Majeed, Mohamed Mabrouk, and Mounir Zrigui. "Recent Trends on Sophisticated types of Flooding Attacks and Detection Methods based on Multi Sensors Fusion Data for Cloud Computing Systems." Fusion: Practice and Applications 11, no. 1 (2023): 37–56. http://dx.doi.org/10.54216/fpa.110103.
Full textGodinho, António, José Rosado, Filipe Sá, Filipe Caldeira, and Filipe Cardoso. "Torrent Poisoning Protection with a Reverse Proxy Server." Electronics 12, no. 1 (2022): 165. http://dx.doi.org/10.3390/electronics12010165.
Full textQamar, Roheen, Baqar Ali Zardari, Zahid Hussain, Abbas Ali Ghoto, and Aijaz Ahmed Arain. "Detection of Distributed Denial of Service (DDoS) Cyber Attacks through Deep Learning Neural Network." Pakistan Journal of Engineering, Technology and Science 12, no. 2 (2024): 28–38. https://doi.org/10.22555/pjets.v12i2.1068.
Full textHsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung, and YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor." Sensors 21, no. 6 (2021): 1980. http://dx.doi.org/10.3390/s21061980.
Full textAlasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.
Full textS, Nithish Babu, Yogesh V, Mariswaran S, and Gowtham N. "Detection of DDOS Attack using Decision Tree Classifier in SDN Environment." Journal of Ubiquitous Computing and Communication Technologies 5, no. 2 (2023): 193–202. http://dx.doi.org/10.36548/jucct.2023.2.006.
Full textKong, Bin, Kun Yang, Degang Sun, Meimei Li, and Zhixin Shi. "Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches." Computer Science and Information Systems 14, no. 3 (2017): 839–56. http://dx.doi.org/10.2298/csis161230032k.
Full textAlmaiah, Mohammed Amin, Rana Alrawashdeh, Tayseer Alkhdour, Romel Al-Ali, Gaith Rjoub, and Theyazan Aldahyani. "Detecting DDoS attacks using machine learning algorithms and feature selection methods." International Journal of Data and Network Science 8, no. 4 (2024): 2307–18. http://dx.doi.org/10.5267/j.ijdns.2024.6.001.
Full textBoyanov, Petar. "REVEALING ANOMALIES BY NETWORK PACKET FLOODING ON BUILT FTP AND OPENSSH SERVERS IN CONTROLLED LAB ENVIRONMENT." Journal Scientific and Applied Research 27, no. 1 (2024): 138–56. http://dx.doi.org/10.46687/jsar.v27i1.414.
Full textSadiq, Amin, Hassan Jamil Syed, Asad Ahmed Ansari, Ashraf Osman Ibrahim, Manar Alohaly, and Muna Elsadig. "Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF." Applied Sciences 13, no. 8 (2023): 4700. http://dx.doi.org/10.3390/app13084700.
Full textZargar, Saman Taghavi, James Joshi, and David Tipper. "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks." IEEE Communications Surveys & Tutorials 15, no. 4 (2013): 2046–69. http://dx.doi.org/10.1109/surv.2013.031413.00127.
Full textLiu, Liang, Weiqing Yu, Zhijun Wu, and Silin Peng. "XGBoost-Based Detection of DDoS Attacks in Named Data Networking." Future Internet 17, no. 5 (2025): 206. https://doi.org/10.3390/fi17050206.
Full textWang, Jin, Liping Wang, and Ruiqing Wang. "MFFLR-DDoS: An encrypted LR-DDoS attack detection method based on multi-granularity feature fusions in SDN." Mathematical Biosciences and Engineering 21, no. 3 (2024): 4187–209. http://dx.doi.org/10.3934/mbe.2024185.
Full textMalliga, S., P. S. Nandhini, and S. V. Kogilavani. "A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed) Denial of Service Attacks." Information Technology and Control 51, no. 1 (2022): 180–215. http://dx.doi.org/10.5755/j01.itc.51.1.29595.
Full textS. Abdulkarem, Huda, and Ammar D. Alethawy. "DDOS ATTACK DETECTION AND MITIGATION AT SDN ENVIROMENT." Iraqi Journal of Information & Communications Technology 4, no. 1 (2021): 1–9. http://dx.doi.org/10.31987/ijict.4.1.115.
Full textKhan, Inam Ullah, Asrin Abdollahi, Ryan Alturki, et al. "Intelligent Detection System Enabled Attack Probability Using Markov Chain in Aerial Networks." Wireless Communications and Mobile Computing 2021 (September 9, 2021): 1–9. http://dx.doi.org/10.1155/2021/1542657.
Full textIbrahim Gide, Aisha, and Abubakar Aminu Mu'azu. "NOVEL APPROACH FOR ADDRESSING IOT NETWORKS VULNERABILITIES IN DETECTION AND CLASSIFICATION OF DOS/DDOS ATTACKS." International Journal of Software Engineering and Computer Systems 10, no. 1 (2024): 50–59. http://dx.doi.org/10.15282/ijsecs.10.1.2024.5.0123.
Full textWang, Licheng, Yun Pan, Mianxiong Dong, Yafang Yu, and Kun Wang. "Economic Levers for Mitigating Interest Flooding Attack in Named Data Networking." Mathematical Problems in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/4541975.
Full textMaestre, Vidal Jorge, Orozco Ana Lucila Sandoval, and Villalba Luis Javier García. "Adaptive artificial immune networks for mitigating DoS flooding attacks." Swarm and Evolutionary Computation 38 (February 1, 2018): 94–108. https://doi.org/10.5281/zenodo.10613651.
Full textDuan, Qi, Ehab Al-Shaer, Samrat Chatterjee, Mahantesh Halappanavar, and Christopher Oehmen. "Proactive routing mutation against stealthy Distributed Denial of Service attacks: metrics, modeling, and analysis." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (2017): 219–30. http://dx.doi.org/10.1177/1548512917731002.
Full textZaman, Ali, Salman A. Khan, Nazeeruddin Mohammad, Abdelhamied A. Ateya, Sadique Ahmad, and Mohammed A. ElAffendi. "Distributed Denial of Service Attack Detection in Software-Defined Networks Using Decision Tree Algorithms." Future Internet 17, no. 4 (2025): 136. https://doi.org/10.3390/fi17040136.
Full textJose, Ancy Sherin, Latha R. Nair, and Varghese Paul. "Towards Detecting Flooding DDOS Attacks Over Software Defined Networks Using Machine Learning Techniques." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 3837–65. http://dx.doi.org/10.47059/revistageintec.v11i4.2411.
Full textP. Narode, Miss Priyanka, and Prof I. R. Shaikh. "Review on EM-CURE Algorithm for Detection DDOS Attack." International Journal Of Engineering And Computer Science 7, no. 01 (2018): 23386–489. http://dx.doi.org/10.18535/ijecs/v7i1.04.
Full textPoongodi, M., and S. Bose. "A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks." International Journal of Information Security and Privacy 8, no. 2 (2014): 1–18. http://dx.doi.org/10.4018/ijisp.2014040101.
Full textJun, Jae-Hyun, Min-Jun Kim, Jeong-Hyun Cho, Cheol-Woong Ahn, and Sung-Ho Kim. "Detection Method of Distributed Denial-of-Service Flooding Attacks Using Analysis of Flow Information." Journal of the Institute of Webcasting, Internet and Telecommunication 14, no. 1 (2014): 203–9. http://dx.doi.org/10.7236/jiibc.2014.14.1.203.
Full textPonnuviji, N. P., and M. Vigilson Prem. "An Enhanced Way of Distributed Denial of Service Attack Detection by Applying Machine Learning Algorithms in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 8 (2020): 3765–69. http://dx.doi.org/10.1166/jctn.2020.9317.
Full textRahmad, Gunawan, Ab Ghani Hadhrami, Khamis Nurulaqilla, Al Amien Januar, and Ismanto Edi. "Deep learning approach to DDoS attack with imbalanced data at the application layer." TELKOMNIKA 21, no. 05 (2023): 1060–67. https://doi.org/10.12928/telkomnika.v21i5.24857.
Full textKaur, Jeewanjot, and Taranjit Singh Aulakh. "A Mitigation Technique for DoS Attack in Wireless Network Based Gradient Matrix and Firefly." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (2018): 136. http://dx.doi.org/10.23956/ijarcsse.v8i1.546.
Full textBahashwan, Abdullah Ahmed, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Al-Amiedy, and Iznan H. Hasbullah. "A deep learning approach to detect DDoS flooding attacks on SDN controller." Indonesian Journal of Electrical Engineering and Computer Science 38, no. 2 (2025): 1245. https://doi.org/10.11591/ijeecs.v38.i2.pp1245-1255.
Full text