![](images/graphics/blank.gif)
The DDoS Problem
-
The paper discusses the concept and problem of identifying DDoS attacks for information management. The main starting mechanisms and types of DDoS attacks are analyzed. To identify them, signature and behavioral methods of analyzing network traffic are used. Analysis of the advantages and disadvantages of these methods actualized the need for their combined use. To detect and classify DDoS attacks, the need to develop and use a neural network model has been updated. The training and testing of the model were made on the initial data from the NSL-KDD set.
5p
longtimenosee09
08-04-2024
4
1
Download
-
With the advancement of technology, the Internet of Things has become a major part in our daily life. It brought up unbelievable influences, potential and growth to human’s society. IoT allows wearable devices, home appliances and software to share and communicate throughout a network using the Internet. Due to the fact that all of a user's private data will be uploaded on the Internet, we must keep an eye on security problems caused by IoT.
9p
huyetthienthan
23-11-2021
34
2
Download
-
OpenFlow, SDN, This paper presents a solution, referred to as SDNbased SYN Flood Guard (SSG), which takes advantages of the OpenFlow’s abilities to match TCP Flags fields and the RST Cookie technique to authenticate the three-way handshake process of TCP connections in a separated device from SDN/Openflow switches. Experiment results reveal that SSG solves the aforementioned problems and improves the SYN Flood attack tolerance compared to the existing solutions.
15p
nguaconbaynhay10
22-01-2021
15
1
Download
-
This paper examines how the Network Management Systems could aid in the detection of the DDoS attacks so that the losses from these could be minimized. The classifications of DDoS Attacks and their Defense Techniques have been classified in this paper to have a close look at the DDoS Problem and its severity.
8p
byphasse043256
24-03-2019
21
0
Download
-
SQL injection attacks pose a serious security threat to Web appli- cations: they allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensi- tive information these databases contain. Although researchers and practitioners have proposed various methods to address the SQL injection problem, current approaches either fail to address the full scope of the problem or have limitations that prevent their use and adoption.
11p
khongmuonnghe
04-01-2013
54
3
Download
-
Security in the virtual world of the Internet is even more confusing than in the real world we inhabit. Buzzwords and marketing hype only serve to add to the puzzle.Vendors and free products abound, but according to the experts, the Internet world is becoming more dangerous every day. How can that be? How can all these solutions from so many directions not solve even the basic problems? The answer is not simple because the problems are so complex. Security is difficult to create and maintain. Security is messy.
689p
maiphuong
11-08-2009
176
89
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)