Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS Attack
biblio
Distributed Denial Of Service(DDoS) Mitigation in Software Defined Network using Blockchain
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
collaborative DDoS mitigation architecture
Topology
smart contracts
DDoS Attack
contracts
smart contract
private blockchain
software-defined networking
autonomous systems
SDN
DDoS
DDoS Prevention Service
distributed denial of service attack
DPS
network threat
Soft Defined Network
DDoS attack mitigation
Human behavior
computer network security
IP networks
telecommunication traffic
Cryptography
telecommunication security
security
software defined networking
Resiliency
Computer crime
pubcrawl
composability
Peer-to-peer computing
Metrics
blockchain
Distributed databases
network topology
biblio
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
network architecture
DDoS attack mitigation
software-defined-network
networking concept
entropy based mitigation
distributed-denial-of-service attack
centralized control management
centralized control
architectural change
mitigation
denial-of-service attack
control plane
data plane
DDoS Attack
Switches
computer network security
attack
SDN
network topology
Entropy
vulnerabilities
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
IP networks
DDoS
biblio
Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
Submitted by aekwall on Mon, 06/01/2020 - 10:43am
SDN
honey pots
SDN-based honeypots
network assest
moving target defense architecture
malwares
defend DDoS attacks
honeypot
distributed denial of service attacks
DDoS Attack
MTD
Human Factors
pubcrawl
IoT security
botnet
software-defined networking
Resiliency
software defined networking
invasive software
malware
IoT devices
Internet of Things
Servers
Scalability
IP networks
computer network security
Computer crime
biblio
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
Submitted by grigby1 on Fri, 05/15/2020 - 11:58am
Reconnaissance
IP networks
motag technique
moving-target defense
Network reconnaissance
numerical evaluations
proactive moving-target defense technique
proxy servers
pubcrawl
internet
replica application servers
resilience
Resiliency
Scalability
Servers
Streaming media
transport protocols
adversarial coupon collection
hypermedia
HTTP redirection
extrapolations
extrapolation
DDoS attacker reconnaissance phase
DDoS Attack
computer network security
Computer crime
Computational modeling
Cloud Computing
cloud based multiserver system
botnet reconnaissance
botnet
AWS prototype
adversarial coupon-collector mathematical model
biblio
Prevention of DDoS Attack through Harmonic Homogeneity Difference Mechanism on Traffic Flow
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
Resiliency
internet
IP address
IP networks
malicious attackers
Metrics
numerous instances
pubcrawl
real-time systems
request packets
resilience
information technology
Servers
simple homogeneity
T-value
telecommunication traffic
time request difference
Traffic flow
transport protocol
transport protocols
zombies
distributed denial of service
CAIDA
client-server systems
composability
Computer crime
computer network security
computer networks
cyber-world
DDoS
DDoS Attack
DDoS Attack Prevention
active computer bots
distributed nature
flow count variable based prevention mechanism
harmonic homogeneity difference mechanism
homogeneity
huge financial loss
huge overhead
Human behavior
ICMP
indirect security attack
biblio
Detection and Prevention of DoS Attacks on Network Systems
Submitted by grigby1 on Wed, 12/18/2019 - 2:46pm
network systems
internet
Internet development
IoT
IoT contraptions
malevolent undertaking
masterminded resources
Metrics
mishandled machines
incorporating establishment
Organizations
PC structures
pubcrawl
resilience
Resiliency
Servers
standard action
strike action
DDoS Attack
botnet
Cloud Computing
composability
Computer crime
computer network security
convergence
DDoS
DDoS ambushes
anomalous express
DDoS Attack Prevention
denial
distributed denial of service strike
DoS attacks
flood
Floods
Human behavior
biblio
Anomaly Based Distributed Denial of Service Attack Detection and Prevention with Machine Learning
Submitted by grigby1 on Wed, 12/18/2019 - 2:45pm
Human behavior
telecommunication traffic
service attack detection
Resiliency
resilience
pubcrawl
pattern clustering
Particle separators
network traffic
Metrics
Measurement
machine learning
learning (artificial intelligence)
anomaly based distributed denial of service attack detection
feature extraction
DoS-DDoS attacks
DDoS Attack Prevention
DDoS Attack
DBSCAN
computer network security
Computer crime
composability
Clustering algorithms
clustering algorithm
Attack vectors
biblio
Prevention and Mitigation of DNS Based DDoS Attacks in SDN Environment
Submitted by grigby1 on Wed, 12/18/2019 - 2:45pm
IP networks
telecommunication traffic
taxonomy
Software Defined Networks
software defined networking
Servers
SDN environment
SDN
Resiliency
resilience
pubcrawl
Protocols
Metrics
IP spoofing
attack packets
internet
Human behavior
domain name system protocol
DNS protocol
DNS
distributed denial-of-service attack
DDoS Attack Prevention
DDoS Attack
DDoS
computer network security
Computer crime
composability
biblio
Distributed Denial of Service Attack Prevention at Source Machines
Submitted by grigby1 on Wed, 12/18/2019 - 2:45pm
source machines
operating system
packet transmission suppression
particle filtering (numerical methods)
pubcrawl
Reliability
reliable DDoS attack prevention scheme
resilience
Resiliency
security
Servers
Metrics
thin hypervisor
throughput overhead
transparent DDoS attack prevention scheme
user experience avoidance
Virtual machine monitors
virtual machines
virtualisation
Virtualization
virtualization overhead reduction
distributed denial of service attack prevention
attack packets
Berkeley packet filter
BitVisor
composability
Computer crime
computer network security
configurable packet filtering mechanism
DDoS Attack
DDoS Attack Prevention
arbitrary packet transmissions
filtering policy
flexible DDoS attack prevention scheme
guaranteed safe code execution mechanism
Hardware
hijacked machines
Human behavior
hypervisor
internet
lightweight DDoS attack prevention scheme
biblio
An Efficient system to stumble on and Mitigate DDoS attack in cloud Environment
Submitted by aekwall on Wed, 12/18/2019 - 2:23pm
mitigation
mitigation method
killer software
facts generation
dynamic asset allocation
distributed denial of carrier
DDoS attack mitigation
cloud networks
DDoS Attack
resilience
microsoft windows
Computer crime
Metrics
composability
pubcrawl
Human behavior
network security
Support vector machines
Conferences
Servers
Cloud Computing
computer network security
« first
‹ previous
1
2
3
4
5
6
next ›
last »