Network attacks: Taxonomy, tools and systems

N Hoque, MH Bhuyan, RC Baishya… - Journal of Network and …, 2014 - Elsevier
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …

The cyber threat landscape: Challenges and future research directions

KKR Choo - Computers & security, 2011 - Elsevier
Cyber threats are becoming more sophisticated with the blending of once distinct types of
attack into more damaging forms. Increased variety and volume of attacks is inevitable given …

[图书][B] Network anomaly detection: A machine learning perspective

DK Bhattacharyya, JK Kalita - 2013 - books.google.com
With the rapid rise in the ubiquity and sophistication of Internet technology and the
accompanying growth in the number of network attacks, network intrusion detection has …

Lessons learned from complex hands-on defence exercises in a cyber range

J Vykopal, M Vizvary, R Oslejsek… - 2017 IEEE Frontiers …, 2017 - ieeexplore.ieee.org
We need more skilled cybersecurity professionals because the number of cyber threats and
ingenuity of attackers is ever growing. Knowledge and skills required for cyber defence can …

El cibercrimen: Fenomenología y criminología de la delincuencia en el ciberespacio

F Miró Llinares - 2012 - torrossa.com
Prólogo marginales». Se trata de actividades que bien no son punibles o son legales, pero
que la gente sigue tratando de ocultar de los demás. Probablemente, las actividades …

Amplification and DRDoS attack defense--a survey and new perspectives

FJ Ryba, M Orlinski, M Wählisch, C Rossow… - arXiv preprint arXiv …, 2015 - arxiv.org
The severity of amplification attacks has grown in recent years. Since 2013 there have been
at least two attacks which involved over 300Gbps of attack traffic. This paper offers an …

Cyborg activism: Exploring the reconfigurations of democratic subjectivity in Anonymous

H Asenbaum - New Media & Society, 2018 - journals.sagepub.com
This article develops the concept of cyborg activism as novel configuration of democratic
subjectivity in the Information Age by exploring the online collectivity Anonymous as a …

A survey of trends in massive DDoS attacks and cloud-based mitigations

FF Wong, CX Tan - International Journal of Network Security & …, 2014 - search.proquest.com
Abstract Distributed Denial of Service (DDoS) attacks today have been amplified into
gigabits volume with broadband Internet access; at the same time, the use of more powerful …

Evaluation of TFTP DDoS amplification attack

B Sieklik, R Macfarlane, WJ Buchanan - computers & security, 2016 - Elsevier
Web threats are becoming a major issue for both governments and companies. Generally,
web threats increased as much as 600% during last year (WebSense, 2013). This appears …

Anonymous: serious threat or mere annoyance?

S Mansfield-Devine - Network Security, 2011 - Elsevier
For a couple of weeks in December 2010, the Wikileaks 'Cablegate'controversy was in
danger of being overshadowed by another, related phenomenon–Distributed Denial of …