Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Chad Calvert"'
Publikováno v:
Journal of Big Data, Vol 10, Iss 1, Pp 1-30 (2023)
Abstract With the massive resources and strategies accessible to attackers, countering Denial of Service (DoS) attacks is getting increasingly difficult. One of these techniques is application-layer DoS. Due to these challenges, network security has
Externí odkaz:
https://doaj.org/article/4e1c0cf815714079a7dded9b55d86b82
Publikováno v:
IRI
Countering Denial of Service (DoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. One of these techniques is application-layer DoS. Due to these challenges, network security has b
Autor:
Taghi M. Khoshgoftaar, Chad Calvert
Publikováno v:
Journal of Big Data, Vol 6, Iss 1, Pp 1-18 (2019)
The integrity of modern network communications is constantly being challenged by more sophisticated intrusion techniques. Attackers are consistently shifting to stealthier and more complex forms of attacks in an attempt to bypass known mitigation str
Publikováno v:
IRI
Detecting Denial of Service (DoS) attacks on web servers has become extremely popular with cybercriminals and organized crime groups. A successful DoS attack on network resources reduces availability of service to a web site and backend resources, an
Publikováno v:
Reuse in Intelligent Systems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7a143991cd3de4036fe01ff915ba4131
https://doi.org/10.1201/9781003034971-8
https://doi.org/10.1201/9781003034971-8
Autor:
Taghi M. Khoshgoftaar, Chad Calvert
Publikováno v:
ICTAI
Proper evaluation of classifier predictive models requires the selection of appropriate metrics to gauge the effectiveness of a model's performance. The Area Under the Receiver Operating Characteristic Curve (AUC) has become the de facto standard met
Publikováno v:
IRI
Attackers can leverage several techniques to compromise computer networks, ranging from sophisticated malware to DDoS (Distributed Denial of Service) attacks that target the application layer. Application layer DDoS attacks, such as Slow Read, are im
Publikováno v:
IRI
Distributed Denial of Service (DDoS) attacks are a popular and inexpensive form of cyber attacks. Application layer DDoS attacks utilize legitimate application layer requests to overwhelm a web server. These attacks are a major threat to Internet app
Publikováno v:
ICMLA
The SSH Brute force attack is one of the most prevalent attacks in computer networks. These attacks aim to gain ineligible access to users' accounts by trying plenty of different password combinations. The detection of this type of attack at the netw
Publikováno v:
International Journal of Reliability, Quality and Safety Engineering. 24:1750002
In this work, we outline a procedure for collecting and labeling Man-in-the-Middle (MITM) attack traffic. Our capture procedure allows for the collection of real-world representative data using a full-scale network environment. MITM attacks are typic