[HTML][HTML] A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack

IM Tas, S Baktir - Applied Sciences, 2023 - mdpi.com
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are
widely deployed technologies since they provide an efficient and fast means of both voice …

A Centralized Mechanism for Preventing DDOS Attack in Wireless Sensor Networks

USR Dhamodharan, S Rajendran… - Wireless Personal …, 2022 - Springer
Wireless sensor networks face numerous limitations. Security and Privacy are the two most
essential parameters that require consideration in wireless sensor networks for conveying …

IMPROVED DEEP REINFORCEMENT LEARNING BASED DEFENSE SYSTEM FOR DISTRIBUTED DENIAL OF SERVICE ATTACK

P Shivaranjani - NeuroQuantology, 2022 - search.proquest.com
Edge computing is the standard integration of cloud and fog computing which has limited
access because of the development of Internet-of-Things (IoT) devices and large amount of …

[PDF][PDF] The Application of Software-Defined Networking On Secure Computer Networks

HF Abbas, WAA Alrikabi - Journal of Education for Pure Science-University …, 2020 - iasj.net
In this paper, we analyze the dos risk within the Software-Defined Networking structure to
look at extenuation strategies. SDN assaults are observed remember normally about the …

[PDF][PDF] consulting-! b

IMAE Abd Elnabi - 2012 - openaccess.aast.edu
During the past few years, denial-of-service (DoS) attacks have become more risky to
deplete the computing resources or bandwidth of the potential targets. The relative ease and …

[引用][C] Survey of DoS attack quelling technics

AB Mahagaonkar, A Buchade - International Journal of Computer Science and …, 2016