Zobrazeno 1 - 10
of 1 546
pro vyhledávání: '"ddos attacks"'
Autor:
Volodymyr Shulha, Maher Rafi Tawffaq, Mohammed Ahmed Jasim, Basim Ghalib Mejbel, Samer Saeed Issa, Loai Alamro, Erahid Aram
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 36, Iss 1, Pp 626-638 (2024)
Background: Given the pervasive connectivity and integration of the Internet of Things (IoT) devices into daily life, system security is of utmost significance in the modern era. The article examines escalating concerns regarding the security of the
Externí odkaz:
https://doaj.org/article/5a838f728cb54a0ab3000d4641ceeaf6
Publikováno v:
Известия Саратовского университета. Новая серия. Серия Математика. Механика. Информатика, Vol 24, Iss 3, Pp 452-462 (2024)
This article defines the rules for finding the threshold values for the main network variables used to detect network intrusions under conditions of limited data sampling. The sFlow technology operates with a limited sample of packets, and one packet
Externí odkaz:
https://doaj.org/article/d0b1736bbac845f086b4286b65ffb647
Publikováno v:
Соціально-економічні відносини в цифровому суспільстві, Vol 3, Iss 53 (2024)
The purpose of this study is to analyze and classify the main schemes of organized and transnational cybercriminal activity, as well as to identify the methods and technologies used by cybercriminals to carry out criminal activities in the digital sp
Externí odkaz:
https://doaj.org/article/4bc2590a8910494592a3fdc0c63b5de7
Publikováno v:
Egyptian Informatics Journal, Vol 27, Iss , Pp 100517- (2024)
This comprehensive study examines cutting-edge strategies for combating Distributed Denial of Service (DDoS) attacks in cloud environments, addressing a critical gap in recent literature. Through a systematic review of the latest advancements, we pro
Externí odkaz:
https://doaj.org/article/54627a5e19fa4023be1d74a6ffe7cfdc
Autor:
Hema Dhadhal, Paresh Kotak
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 2, Pp 136-146 (2024)
Software-Defined Networking (SDN) has emerged as a transformative paradigm for network management, offering centralized control and programmability. However, with the proliferation of Distributed Denial of Service (DDoS) attacks that pose significant
Externí odkaz:
https://doaj.org/article/b6b7680b3f964e8ba34c2a4b0e5e4fee
Autor:
Yasmeen Alslman, Ashwaq Khalil, Remah Younisse, Eman AlNagi, Jaafer Al-Saraireh, Rawan Ghnemat
Publikováno v:
Jordanian Journal of Computers and Information Technology, Vol 10, Iss 2, Pp 123-137 (2024)
We live in an era when time is a precious resource. Thus, dealing with the vast amount of data collected from different resources for various purposes requires creating systems that can process the data in a reasonable time to make it worthwhile. Acc
Externí odkaz:
https://doaj.org/article/a218afe976bb4f6aae99bc9bcb522edf
Autor:
Hesham A. Sakr, Mostafa M. Fouda, Ahmed F. Ashour, Ahmed Abdelhafeez, Magda I. El-Afifi, Mohamed Refaat Abdellah
Publikováno v:
Egyptian Informatics Journal, Vol 28, Iss , Pp 100540- (2024)
With the growing integration of IoT devices in critical infrastructure, cybersecurity threats such as Distributed Denial of Service (DDoS) attacks on Energy Hubs (EH) have become a significant concern. This study aims to address these challenges by e
Externí odkaz:
https://doaj.org/article/d40c1ad3d4df4bd7bcb76c5f81725af9
Autor:
Tawfiq Aljohani, Abdulaziz Almutairi
Publikováno v:
Ain Shams Engineering Journal, Vol 15, Iss 7, Pp 102860- (2024)
With the continuous development of transportation electrification, Electric Vehicle Charging Stations (EVCS) have become pivotal components, necessitating robust cybersecurity frameworks to mitigate potential threats. This work explores the complex d
Externí odkaz:
https://doaj.org/article/229a4199d9c64e068848980c744f7070
Autor:
Md. Alamgir Hossain, Md. Saiful Islam
Publikováno v:
Measurement: Sensors, Vol 32, Iss , Pp 101037- (2024)
Distributed denial-of-service (DDoS) attacks pose a significant threat to computer networks and systems by disrupting services through the saturation of targeted systems with traffic from multiple sources. Real-time detection of these attacks has bec
Externí odkaz:
https://doaj.org/article/2ff321c57c374974ac418a56bd631707
Publikováno v:
IEEE Access, Vol 12, Pp 166675-166702 (2024)
Software-Defined Networking (SDN) is a promising solution for large-scale network management that offers extensive opportunities for optimization. However, the centralized control inherent in SDN also exposes networks to security threats, notably Dis
Externí odkaz:
https://doaj.org/article/d5291bcbeb064582b0fd517415e4e835