A systematic review on distributed denial of service attack defense mechanisms in programmable networks

BL Dalmazo, JA Marques, LR Costa… - … Journal of Network …, 2021 - Wiley Online Library
Design flaws and vulnerabilities inherent to network protocols, devices, and services make
Distributed Denial of Service (DDoS) a persisting threat in the cyberspace, despite decades …

Neural network-based distributed adaptive pre-assigned finite-time consensus of multiple TCP/AQM networks

C Wang, X Chen, J Cao, J Qiu, Y Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this study, a class of finite-time consensus of multiple transmission control protocol/active
queue management (TCP/AQM) networks is investigated on the basis of a design idea of …

Towards the development of a cloud computing intrusion detection framework using an ensemble hybrid feature selection approach

NO Ogwara, K Petrova, ML Yang - Journal of Computer …, 2022 - Wiley Online Library
Attacks on cloud computing (CC) services and infrastructure have raised concerns about the
efficacy of data protection mechanisms in this environment. The framework developed in this …

Secure IoT edge: Threat situation awareness based on network traffic

Y Zhao, G Cheng, Y Duan, Z Gu, Y Zhou, L Tang - Computer Networks, 2021 - Elsevier
Threat situation awareness is one of the new major technologies to avoid network attacks
and ensure equipment security. Facing the current IoT network architecture which is …

Consensus congestion control for ad hoc networks: time-delay and saturation

BA Sadek, T El Houssaine, KA Barbosa… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This work focuses on the congestion control design for ad hoc networks affected by time-
delay and asymmetrical input saturation. First, an innovative general TCP/AQM model for …

Unified dynamic bandwidth allocation scheme for ethernet passive optical network

M Kolhar, F Al-Turjman, A Alameen - IEEE Access, 2020 - ieeexplore.ieee.org
The most important challenge in an Ethernet Passive Optical Network (EPON) is bandwidth
allocation. This is because it is a mandatory service to satisfy the end users' service level …

Forensik Jaringan DDoS menggunakan Metode ADDIE dan HIDS pada Sistem Operasi Proprietary

A Yudhana, I Riadi - MATRIK: Jurnal …, 2022 - journal.universitasbumigora.ac.id
Forensik jaringan sangat dibutuhkan dalam mempertahankan kinerja jaringan komputer
dari serangan Distributed Denial of Service (DDoS). Penelitian ini bertujuan untuk …

Stability of SDE‐LJN System in the Internet to Mitigate Constant‐Rate DDoS Attacks

K Huang, L Tan, G Peng - Security and Communication …, 2021 - Wiley Online Library
The Internet is nowadays suffering dramatically serious attacks, with the distributed denial of
service (DDoS) attacks being the representative and dominant ones. It is seen that, to …

Approximation models for the evaluation of TCP/AQM networks

D Marek, A Domański, J Domańska… - Bulletin of the Polish …, 2022 - yadda.icm.edu.pl
The article proposes a model in which Diffusion Approximation is used to analyse the
TCP/AQM transmission mechanism in a multinode computer network. In order to prevent …

[PDF][PDF] Real-Time Transmission Control Protocol-Synchronize-Based Distributed Denial of Service Detection Framework Using Entropy Variations in Self-Coded Bot …

B Habib, F Khursheed - Electrica, 2023 - electricajournal.org
Among the recent network infrastructure proliferations, distributed denial of service (DDoS)
attack continues to be one of the most severe security threats. It becomes difficult to detect …