Search results for "DDoS"

showing 5 items of 5 documents

Mitigating DDoS using weight‐based geographical clustering

2020

Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters …

Anomaly intrusion detectionsComputer Networks and CommunicationsComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackFault tolerancecomputer.software_genreClustering techniquesData segmentComputer Science ApplicationsTheoretical Computer ScienceComputational Theory and MathematicsMitigating DDoS attacksCloud burstingData miningCluster analysisWeight based dosingcomputerSoftwareAddress clusteringMitigation techniquesConcurrency and Computation: Practice and Experience
researchProduct

A study about DDoS attacks in SIP environments

2007

Settore ING-INF/03 - TelecomunicazioniDDoS SIP Protocol Change Detection
researchProduct

Interneta drošības risinājumi

2015

Interneta drošības risinājumi. Oskars Veiss, darba vadītājs Latvijas Universitātes lektors Valdis Auza. Darba mērķis: Noskaidrot izkliedētā pakalpojuma attāluma(DDOS) un mēstuļu izplatību Latvijā un Pasaulē. Darba uzdevumi: 1.Apspoguļot izkliedētā pakalpojuma attāluma(DDOS) uzbrukumu būtību. 2.Apkopot informācija par tā attīstību (DDOS) 3.Izpētīt uzņēmuma aizsardzību pret šādiem uzbrukumiem 4.Sniegt rininājumus un priekšlikumus to novēršanai Pētījumā secināts, ka uzņēmuma nav izstrādāta efektīva aizsardzība pret šiem uzbrukumiem. Sniegti risinājumi un priekšlikumi tā aizsardzībai. Darbs satur 60lpp, 23 attēlus, 1 pielikums. Darba praktiskajā daļā veikta aptauja uzņēmumā „X”. Respondentu ska…

VadībzinātneMēstulesDrošībaDDOSMalware
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

Sovellustason palvelunestohyökkäysten havainnointiin ja torjumiseen käytettävät menetelmät ja teknologiat

2015

Tutkielmassa tarkastellaan sovelluskerroksiin kohdistuvien palvelunestohyökkäysten tunnistamiseen ja torjumiseen käytettäviä menetelmiä ja teknologioita. This research reviews different methods for detecting, mitigating and countering application layer denial-of-service attacks.

torjumineninternetDoSpalvelunestohyökkäysDDoStunnistaminensovellustaso
researchProduct