I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to …
A Zaalouk, R Khondoker, R Marx… - 2014 IEEE Network …, 2014 - ieeexplore.ieee.org
The original design of the Internet did not take network security aspects into consideration, instead it aimed to facilitate the process of information exchange between end-hosts …
As one of the most devastating types of Distributed Denial of Service (DDoS) attacks, Domain Name System (DNS) amplification attack represents a big threat and one of the …
GCM Moura, S Castro, J Heidemann… - Proceedings of the 21st …, 2021 - dl.acm.org
TheInternet's Domain Name System (DNS) is a part of every web request and e-mail exchange, so DNS failures can be catastrophic, taking out major websites and services. This …
The severity of amplification attacks has grown in recent years. Since 2013 there have been at least two attacks which involved over 300Gbps of attack traffic. This paper offers an …
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) Attack, which is one that intentionally occupies the computing resources and bandwidth in order to …
Nowadays, blockchain is seen as one of the main technological innovations. Many applications can rely on the blockchain to secure their exchanges. However, applications …
CC Chen, YR Chen, WC Lu, SC Tsai… - 2017 IEEE conference …, 2017 - ieeexplore.ieee.org
Distributed denial of service (DDoS) is an attack that attempts to disrupt network service for various malicious purposes. It makes use of public services as reflectors to amplify the traffic …
DNS protocol is critically important for secure network operations. All networked applications request DNS protocol to translate the network domain names to correct IP addresses. The …