Zobrazeno 1 - 10
of 326
pro vyhledávání: '"DDoS mitigation"'
Autor:
Denis Salopek, Miljenko Mikuc
Publikováno v:
Sensors, Vol 23, Iss 17, p 7636 (2023)
The increasing network speeds of today’s Internet require high-performance, high-throughput network devices. However, the lack of affordable, flexible, and readily available devices poses a challenge for packet classification and filtering. This pr
Externí odkaz:
https://doaj.org/article/e7a7716aecb440709353b755932af1a3
Publikováno v:
Journal of ICT, Vol 20, Iss 3, Pp 277-304 (2021)
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. Researchers have been able to develop s
Externí odkaz:
https://doaj.org/article/c5ebd89b4e8d45078240050b2971a665
Publikováno v:
IEEE Access, Vol 9, Pp 113061-113076 (2021)
Distributed Denial of Service (DDoS) attacks mitigation typically relies on source IP-based filtering rules; these may present scaling issues due to the vast amount of involved sources. By contrast, we propose a source IP-agnostic DDoS traffic classi
Externí odkaz:
https://doaj.org/article/3ce6182254f046228cfaf2b607f547de
Publikováno v:
IEEE Access, Vol 8, Pp 211434-211450 (2020)
As the continuous in-depth research of sixth generation (6G) technology, the satellite networks in the Space-Air-Ground Integrated Network (SAGIN) have received more and more attention. However, since satellite nodes have the characteristics of limit
Externí odkaz:
https://doaj.org/article/687b7eb2cdd24281819c28c66da1ca89
Publikováno v:
Sensors, Vol 23, Iss 1, p 102 (2022)
In the recent past, Distributed Denial of Service (DDoS) attacks have become more abundant and present one of the most serious security threats. In a DDoS attack, the attacker controls a botnet of daemons residing in vulnerable hosts that send a sign
Externí odkaz:
https://doaj.org/article/f05f38c8e31441dcab77733d364318c0
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ETRI Journal, Vol 41, Iss 5, Pp 574-584 (2019)
A new Mirai variant found recently was equipped with a dynamic update ability, which increases the level of difficulty for DDoS mitigation. Continuous development of 5G technology and an increasing number of Internet of Things (IoT) devices connected
Externí odkaz:
https://doaj.org/article/e08d88160242460e8391a28c2a493c5a
Autor:
Qingguo Zhou, Rui Zhou, Guangming Cui, Cheng Wang, Bo Li, Yang Xiang, Yun Yang, Hai Jin, Qiang He
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2333-2348
Edge computing (EC) is an emerging paradigm that extends cloud computing by pushing computing resources onto edge servers that are attached to base stations or access points at the edge of the cloud in close proximity with end-users. Due to edge serv
Publikováno v:
IEEE Transactions on Industrial Informatics. 18:2734-2744
Nowadays, a large number of intelligent devices involved in the Industrial Internet of Things (IIoT) environment lead to unprecedented challenges in security. Due to limited resources with weak security protection, the IIoT devices can be easily comp