Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IP networks
biblio
A Study on Service Identification Based on Server Name Indication Analysis
Submitted by grigby1 on Fri, 07/03/2020 - 1:26pm
pubcrawl
Transport Layer Security
TLS/SSL
telecommunication traffic
Service Name Indication (SNI)
service identification method
Service Identification
Server Name Indication analysis
security issues
Scalability
Resiliency
resilience
quality of service
computer network security
port numbers
IP networks
IP network flows
IP addresses
identification accuracy
dpi
Deeply Programmable Network (DPN)
Deep Packet Inspection (DPI)
deep packet inspection
current IP flows
Cryptography
biblio
Detecting and Preventing IP Spoofing and Local Area Network Denial (LAND) Attack for Cloud Computing with the Modification of Hop Count Filtering (HCF) Mechanism
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
memory exhaustion minimization
Internet Protocol
IP
IP spoofing detection
IP spoofing prevention
IP2HC table
LAND attack
LAND based DDoS attack
local area network denial attack
malformed packets
hop count filtering mechanism
smurf attack
Source port
spoofed packets
SYN flood attack
teardrop attack
TTL
victim server
virtual cloud environment
internet
Cloud Computing
IP networks
distributed denial of service attack
Resiliency
Human behavior
pubcrawl
composability
Metrics
computer network security
Local area networks
IP spoofing
Flooding Attack
DDoS Attack Prevention
CloudSim 3.0 toolkit
Distributed Denial of Service(DDoS)
HCF mechanism
Hop Count Filtering (HCF)
biblio
DDOS Defense Strategy in Software Definition Networks
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
DDoS
victim defense strategy
ubiquitous situation
software definition network
Software Definition
social life
network society
network economy
military life
distributed defense strategy
distributed defense strategies
defense strategy
DDOS defense strategy
DDoS Attack
cultural life
DDoS Attack Prevention
Computer crime
denial-of-service attack
intermediate network
computer viruses
attack
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
network security
software defined networking
IP networks
computer network security
biblio
DDoS Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots
Submitted by aekwall on Mon, 06/29/2020 - 12:57pm
intrusion prevention
Web sites
Web demands
virtual honeypot
Servers
security issues
resource allocation issues
resource allocation
Resiliency
pubcrawl
Prevention
network security
Monitoring
mitigation
Metrics
IP networks
client Websites
intrusion
internet
Human behavior
distributed virtual honeypot model
Distributed Denial of Service (DDoS)
denial-of-service attack
DDoS security
DDoS Attacks
DDoS Attack Prevention
DDoS attack mitigation
Content distribution networks
content delivery networks
computer network security
Computer crime
composability
biblio
Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
efficient service delivery
Switches
DDoS detection
Meters
data plane
denial-of-service attack
network resources
centralized controller
attack volume
OpenFlow protocol
network safe
network security threat
networking infrastructure
OpenFlow enabled SDN
UDP flooding
user datagram protocol
DDoS attack mitigation
composability
computer network security
DDoS
IP networks
software defined networking
DDoS Attacks
Resiliency
Human behavior
pubcrawl
Computer crime
Protocols
Metrics
internet
Entropy
OpenFlow
SDN
Bandwidth
biblio
Distributed Denial Of Service(DDoS) Mitigation in Software Defined Network using Blockchain
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
collaborative DDoS mitigation architecture
Topology
smart contracts
DDoS Attack
contracts
smart contract
private blockchain
software-defined networking
autonomous systems
SDN
DDoS
DDoS Prevention Service
distributed denial of service attack
DPS
network threat
Soft Defined Network
DDoS attack mitigation
Human behavior
computer network security
IP networks
telecommunication traffic
Cryptography
telecommunication security
security
software defined networking
Resiliency
Computer crime
pubcrawl
composability
Peer-to-peer computing
Metrics
blockchain
Distributed databases
network topology
biblio
Scalable DDoS Mitigation System
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
detection
DDoS attack mitigation
protection
multitarget DDoS attacks
modular filtering system
filtration
DDoS mitigation system
DDoS attacks filtering
data center
data centers
tools
internet
Metrics
Computer crime
composability
pubcrawl
Human behavior
Resiliency
Hardware
Servers
IP networks
distributed denial of service attacks
Monitoring
DDoS
computer network security
biblio
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
network architecture
DDoS attack mitigation
software-defined-network
networking concept
entropy based mitigation
distributed-denial-of-service attack
centralized control management
centralized control
architectural change
mitigation
denial-of-service attack
control plane
data plane
DDoS Attack
Switches
computer network security
attack
SDN
network topology
Entropy
vulnerabilities
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
IP networks
DDoS
biblio
Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance
Submitted by aekwall on Mon, 06/29/2020 - 12:47pm
abnormal traffic
DDoS attack detection
simulated DDoS attacks
Shannon entropy
Mahalanobis distance
KOAD
Internet enabled services
Internet based services
hybrid method
Flash Event
FE traffic
DDoS attack simulation
analogous flash events
computer network security
Entropy
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
telecommunication traffic
IP networks
distributed denial of service attacks
DDoS
biblio
Fast Detection and Mitigation to DDoS Web Attack Based on Access Frequency
Submitted by aekwall on Mon, 06/29/2020 - 12:47pm
internet
Web servers
Web request
web applications
Time-frequency Analysis
storage space
security of data
Resiliency
realtime attack response
pubcrawl
Protocols
Processing time
Metrics
IP networks
access frequency
immediate defense mechanism
Human behavior
hacker botnets
DDoS Web attack
DDoS attack mitigation
DDoS Detection and Mitigation
DDoS Attacks
DDoS attack detection
data structures
Computer crime
composability
botnet
attack packets
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »