flash crowds
Recently Published Documents


TOTAL DOCUMENTS

64
(FIVE YEARS 5)

H-INDEX

13
(FIVE YEARS 1)

2021 ◽  
Vol 10 (1) ◽  
pp. 38-44
Author(s):  
S. Selvakani ◽  
K. Vasumathi ◽  
T. Vijayalakshmi ◽  
A. Kavitha

DOS assaults are executed with the aid of using assault tools, worms and botnets the usage of exclusive packet-transmission techniques and diverse types of assault packets to conquer protection structures. These issues cause protection structures requiring diverse detection techniques to be able to discover assaults. Moreover, DOS assaults can blend their traffics for the duration of flash crowds. By doing this, the complicated protection machine cannot locate the assault site visitors in time. In this challenge a conduct primarily based totally detection the usage of Crowd Correlation Analysis which can discriminate DOS assault site visitors from site visitors generated with the aid of using actual customers. In the Euclidean area to specific as a diagonal matrix proposed can grasp the potential of community machine towards every assault manner and the protection functionality of community machine. Cyber-assault consisting of DDOS assault continues to be the maximum effective assault that disrupts the real customers from having access to the crucial offerings. In software layer-primarily based totally DDOS assault, attacker makes use of different gadget in preference to the usage of his very own IP cope with to flood the focused machine and disrupts the offerings SDN (software program described networks) for value performance and community Application layer allotted denial of provider (DDOS) assaults have turn out to be a extreme hazard to the safety of net servers. These assaults avoid maximum intrusion prevention structures with the aid of using sending several HTTP requests flexibility, however DDOS is one of the maximum released assault on SDN layer. DDOS assault on this kind of surroundings results in machine failure DDoS is one of the maximum released assault on SDN layer. DDOS assault on this kind of surroundings results in machine failure monetary loss, facts theft, and overall performance degradation massive survey has been made to locate and save you DDOS primarily based totally assault in software layer and SDN primarily based totally surroundings. We suggest an powerful protection machine, named Sky Shield, which leverages the caricature facts shape to fast locate and mitigate software layer DDOS assaults. Novel calculation of the divergence among sketches, which alleviates the effect of community dynamics and improves the detection accuracy.


2020 ◽  
Vol 58 (4) ◽  
pp. 31-37 ◽  
Author(s):  
Simona Marinova ◽  
Valentin Rakovic ◽  
Daniel Denkovski ◽  
Thomas Lin ◽  
Vladimir Atanasovski ◽  
...  

Author(s):  
Navuday Sharma ◽  
Maurizio Magarini ◽  
Muhammad Mahtab Alam

Unmanned aerial vehicles (UAVs) are expected to provide data service to users as aerial base stations, as gateways to collect the data from various sensors, and as sensor-mounted aerial platforms deployed in smart cities. The study in this chapter initially starts with the air-to-ground (A2G) channel model. Due to the unavailability of channel parameters for UAVs at low altitudes, measurements were performed using a radio propagation simulator for generalized environments developed using ITU-R parameters. Further, cell coverage analysis is shown with simulation results obtained from the ray tracing. Later, an optimal replacement to UDNs was proposed to support the flash crowds and smart cites known as ultra-dense cloud drone network. This system is advantageous as it offers reduction in total cost of ownership due to its on-demand capability. Further, work is shown on implementing parameters for 5G physical layer with generalized frequency division multiplexing modulation over A2G channel on the UAV network to provide reliable and faster connectivity for ground users and sensors.


2019 ◽  
Vol 8 (2) ◽  
pp. 3488-3493

Wide Area Networks (WANs) are subjected massive Denial of Service (DoS) attacks known as Distributed Denial of Service (DDoS) attacks. There are many distributed computing use cases in the real world. They include banking, insurance, e-Commerce and a host of other applications. In distributed environments, these applications are targeted by adversaries for launching DDoS attacks of various kinds. Such attacks cause the servers to be very busy answering fake traffic from the compromised nodes used by attackers from behind the scene. Large number of computers over Internet are compromised by attackers and through such machines DDoS attack is made. The server machines that provide services to genuine users become victims of such attacks. Detecting DDoS attacks is difficult in the presence of flash crowds that resembles DDoS traffic. As there are different kinds of DDoS attacks, it is understood, from the literature, that there is need for further research to have a comprehensive framework for detecting different kinds of DDoS attacks. In this paper we proposed a hybrid approach for detecting various kinds of DDoS attacks and simulation study is made to have proof of the concept. The results of the experiments revealed that the proposed methodology is useful to detect DDoS attacks in wide area networks.


Author(s):  
Eliseu Cesar Miguel ◽  
Italo Cunha ◽  
Cristiano M. Silva ◽  
Fernando Carvalho ◽  
Sergio V. A. Campos

Sign in / Sign up

Export Citation Format

Share Document