AY Nur - 2021 International Symposium on Networks …, 2021 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are among the most perilous attack types in the Internet. In addition to the significant harms for the victim site, intermediate Autonomous …
S Aktar, AY Nur - 2021 4th International Conference on …, 2021 - ieeexplore.ieee.org
The design of IP protocol creates difficulties in identifying the true source of any packet, which makes it one of the most arduous problems to defend against Denial of Service (DoS) …
HH Chen, CH Lee, SK Huang - J. Inf. Sci. Eng., 2016 - academia.edu
Anomalous traffic volume can be used for identifying network threats and faults. Denial of service (DoS) and quality of service (QoS) are two contrasting problems of anomalous …
Z Wu, G Li, M Yue, H Zeng - J. Comput., 2014 - jcomputers.us
Distributed Denial of Service (DDoS) attack is one of the greatest threats to connectivity, continuity, and availability of the Internet. In this paper, two typical types of DDoS attacks …
HH Chen, SK Huang - Intelligent Systems and Applications, 2015 - ebooks.iospress.nl
In the paper, we propose the distributed detection and identification multi-agent system (DDIMAS) framework that is the first attempt to apply in solving distributed denial of service …