Academic literature on the topic 'Smurf attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Smurf attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Smurf attacks"
Sun, Fei Xian. "Danger Theory Based Risk Evaluation Model for Smurf Attacks." Key Engineering Materials 467-469 (February 2011): 515–21. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.515.
Full textHartanto, Sri. "The Impact of Smurf Attack on Web Server In Communication Network And Its Preventions." Impact of Smurf Attack on Web Server In Communication Network And Its Preventions 1, Vol. 1 No. 1 (2023): July 2023 (2024): 12. https://doi.org/10.59890/ijsas.v1i1.138.
Full textParadise, Paradise, Wahyu Adi Prabowo, and Teguh Rijanandi. "Analysis of Distributed Denial of Service Attacks Using Support Vector Machine and Fuzzy Tsukamoto." JURNAL MEDIA INFORMATIKA BUDIDARMA 7, no. 1 (2023): 66. http://dx.doi.org/10.30865/mib.v7i1.5199.
Full textА.Т., Кобевко, та Тимченко О.В. "Нечітке дерево рішень для мережевого захисту від DoS-атак". Моделювання та інформаційні технології. Зб. наук. пр. ІПМЕ ім. Г.Є. Пухова НАН України, № 88 (15 грудня 2019): 203–8. https://doi.org/10.5281/zenodo.3859687.
Full textArif Wirawan Muhammad, Muhammad Nur Faiz, and Ummi Athiyah. "Pengembangan Perangkat Lunak Untuk Deteksi DDoS Berbasis Neural Network." Infotekmesin 13, no. 2 (2022): 301–7. http://dx.doi.org/10.35970/infotekmesin.v13i2.1544.
Full textRazumov, P. V., L. V. Cherckesova, O. A. Safaryan, and I. Strubchik. "Smurf as Spoof Type Attacking Activity on Network and Neutralization." Journal of Physics: Conference Series 2131, no. 2 (2021): 022078. http://dx.doi.org/10.1088/1742-6596/2131/2/022078.
Full textEtza nofarita. "IMPLEMENTASI APLIKASI SOFTWARE NATURAL NETWORK MENDETEKSI TINGKATAN SERANGAN DDOS PADA JARINGAN KOMPUTER." Elkom : Jurnal Elektronika dan Komputer 14, no. 2 (2021): 268–77. http://dx.doi.org/10.51903/elkom.v14i2.501.
Full textMahmood, Hassan, Danish Mahmood, Qaisar Shaheen, Rizwan Akhtar, and Wang Changda. "S-DPS: An SDN-Based DDoS Protection System for Smart Grids." Security and Communication Networks 2021 (March 20, 2021): 1–19. http://dx.doi.org/10.1155/2021/6629098.
Full textRao, Gottapu Sankara, and P. Krishna Subbarao. "A Novel Approach for Detection of DoS / DDoS Attack in Network Environment using Ensemble Machine Learning Model." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 244–53. http://dx.doi.org/10.17762/ijritcc.v11i9.8340.
Full textNajm Abdulla, Nazanin, and Rajaa K. Hasoun. "Review of Detection Denial of Service Attacks using Machine Learning through Ensemble Learning." Iraqi Journal for Computers and Informatics 48, no. 1 (2022): 13–20. http://dx.doi.org/10.25195/ijci.v48i1.349.
Full textBook chapters on the topic "Smurf attacks"
Cao, Wantian, and Xingchuan Bao. "The Research on the Detection and Defense Method of the Smurf-Type DDos Attack." In Proceedings of International Conference on Soft Computing Techniques and Engineering Application. Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-1695-7_36.
Full textConference papers on the topic "Smurf attacks"
Hasan, Ali, Tahir Iqbal, Mazhar Naseer, Nadeem Sarwar, Aitizaz Ali, and Mohamed Shabir. "Advanced Detection and Mitigation of Smurf Attacks Using AI and SDN." In 2024 International Conference on Decision Aid Sciences and Applications (DASA). IEEE, 2024. https://doi.org/10.1109/dasa63652.2024.10836590.
Full textZargar, Gholam Reza, and Peyman Kabiri. "Identification of effective network features to detect Smurf attacks." In 2009 IEEE Student Conference on Research and Development (SCOReD). IEEE, 2009. http://dx.doi.org/10.1109/scored.2009.5443345.
Full textBouyeddou, Benamar, Fouzi Harrou, Ying Sun, and Benamar Kadri. "Detection of smurf flooding attacks using Kullback-Leibler-based scheme." In 2018 4th International Conference on Computer and Technology Applications (ICCTA). IEEE, 2018. http://dx.doi.org/10.1109/cata.2018.8398647.
Full textKumar, S., M. Azad, O. Gomez, and R. Valdez. "Can Microsoft’s Service Pack2 (SP2) Security Software Prevent SMURF Attacks?" In Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06). IEEE, 2006. http://dx.doi.org/10.1109/aict-iciw.2006.60.
Full textRevathy, G., V. Rajendran, P. Sathish Kumar, S. Vinuharini, and G. N. Roopa. "Smurf attack using hybrid machine learning technique." In INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SCIENCE AND TECHNOLOGY (RIST 2021). AIP Publishing, 2022. http://dx.doi.org/10.1063/5.0080211.
Full textZheng, Jigang, and Jingmei Zhang. "Cluster Analysis of Smurf Type of Denial of Service Attack." In 2016 4th International Conference on Management, Education, Information and Control (MEICI 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/meici-16.2016.2.
Full textKumar, Sanjeev. "Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet." In Second International Conference on Internet Monitoring and Protection (ICIMP 2007). IEEE, 2007. http://dx.doi.org/10.1109/icimp.2007.42.
Full textSingh, Navneet Kumar, and Santhosh Kumar B. J. "Detection and Prevention of UDP Protocol Exploiting and Smurf Attack in WSN Using Sequential Probability Ratio Test Algorithm." In 2023 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2023. http://dx.doi.org/10.1109/icdsns58469.2023.10245010.
Full text