Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Timely Detection of DDoS Attacks with Dimenstionality Reduction

View through CrossRef
Due to the interconnectedness and exponential proliferation of IoT devices, the technology is more susceptible to network attacks like Distributed Denial of Service (DDoS), which disrupt network resources. A growing threat to cloud computing systems is the Distributed Denial of Service (DDoS) attack, in which the attacker starts the attack by taking advantage of computers both inside and outside the cloud system. Real-time analysis of cloud network data is essential for preventing DDoS attacks. DDoS attacks interfere with the operation of Io- connected apps and services by taking advantage of the constrained resources on IoT devices. The impacts of DDoS attacks, which seriously damage current systems, are thoroughly examined in this article in the context of the Internet of Things. One of the most common network attacks is the distributed denial-of-service attack (DDoS). DDoS assaults intensified due to the quick development of computer and communication technologies. Therefore, investigating the detection of a DDoS attack is crucial. A single technique cannot offer adequate security due to the variety of DDoS attack techniques.
Title: Timely Detection of DDoS Attacks with Dimenstionality Reduction
Description:
Due to the interconnectedness and exponential proliferation of IoT devices, the technology is more susceptible to network attacks like Distributed Denial of Service (DDoS), which disrupt network resources.
A growing threat to cloud computing systems is the Distributed Denial of Service (DDoS) attack, in which the attacker starts the attack by taking advantage of computers both inside and outside the cloud system.
Real-time analysis of cloud network data is essential for preventing DDoS attacks.
DDoS attacks interfere with the operation of Io- connected apps and services by taking advantage of the constrained resources on IoT devices.
The impacts of DDoS attacks, which seriously damage current systems, are thoroughly examined in this article in the context of the Internet of Things.
One of the most common network attacks is the distributed denial-of-service attack (DDoS).
DDoS assaults intensified due to the quick development of computer and communication technologies.
Therefore, investigating the detection of a DDoS attack is crucial.
A single technique cannot offer adequate security due to the variety of DDoS attack techniques.

Related Results

Mitigating DDoS Attacks in Cloud Networks
Mitigating DDoS Attacks in Cloud Networks
Distributed Denial of Service (DDoS) attacks represent a significant and growing threat to cloud networks, capable of causing extensive service disruptions and substantial financia...
A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques
A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques
Distributed Denial of Service (DDoS) persists in Online Applications as One of those significant threats. Attackers can execute DDoS by the more natural steps. Then with the high p...
Detection & Mitigation of DDOS Attack
Detection & Mitigation of DDOS Attack
Abstract The DDoS (Distributed Denial of Service) attack is a type of Cyberattack in which multiple attackers aim to attack different network resources like a server or a w...
A lightweight machine learning approach for DDoS detection and classification
A lightweight machine learning approach for DDoS detection and classification
Abstract With the development of network technology, more and more protocols and devices are used in DDoS reflection and exploitation attacks. Different DDoS attacks often ...
MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS
MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease o...
On the inference and prediction of DDoS campaigns
On the inference and prediction of DDoS campaigns
AbstractThis work proposes a distributed denial‐of‐service (DDoS) inference and forecasting model that aims at providing insights to organizations, security operators, and emergenc...
An Adaptive Flooding Detection Framework With Blockchain Mitigation for Satellite Communications
An Adaptive Flooding Detection Framework With Blockchain Mitigation for Satellite Communications
ABSTRACTSatellite communication has gained significant attention in the context of sixth‐generation (6G) internet technology. Due to their high altitudes, dynamic link switching, a...

Back to Top