A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. Bandwidth DDoS (BW DDoS) attacks disrupt […]
DEFENSE AND DETECTION OF BWDDOS ATTACK
A denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. Bandwidth DDoS (BW DDoS) attacks disrupt […]
Detection of Bandwidth Distributed Denial of Service Attacks
BW-DDoS attacks are usually generated from a large number of compromised computers (zombies or pup-pets). BW-DDoS attackers use different techniques and different types of attacking agents. The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. So far, BW-DDoS […]
MCA-based DoS attack detection system
This paper proposed a new multivariate correlation analysis (MCA) based detection system to protect online services against Denial of Service (DoS) attacks. It is powered by the triangle-area based MCA technique and the anomaly-based detection technique. The detection process consists of three major steps: Basic Feature generation for network traffic records, multivariate correlation analysis, and […]
Secure Deduplication Systems – An Hybrid Approach
In this paper, aiming at efficiently solving the problem of deduplication with differential privileges in cloud computing, we consider a hybrid cloud architecture consisting of a public cloud and a private cloud. The data owners only outsource their data storage by utilizing public cloud while the data operation is managed in private cloud. A new […]
Location-Privacy Preserving Mechanism for LBS
In this paper we propose a novel location-privacy preserving mechanism for Location based services. To take advantage of the high effectiveness of hiding user queries from the server, which minimizes the exposed information about the users’ location to the server; we propose a mechanism in which a user can hide in the mobile crowd while […]
Interpreting the Public Sentiment Variations on Twitter
This paper presented a study on the implementation of fault-tolerant network interfaces for NoCs. A fault-free network interface assumes a particular relevance in the design of a reliable multiprocessor system-on chip (MPSoC). In this paper, we focus on an NI providing basic communication services. Presented fault models and fault-tolerant techniques can be, however, extended to […]
A Novel Network Security Metric Computation and Application
In this paper, we propose a novel network security metric, k-zero day safety. This is among the first efforts on network security metrics that is capable of modeling the security risk of unknown zero-day attacks. The metric would bring about new opportunities to the quantitative evaluation, hardening, and design of secure networks. We then studied […]
Dynamic Operations on the Outsourced Data
The dynamic operations in the proposed scheme are performed at the block level via a request in the general form Existing research close to our work can be found in the areas of integrity verification of outsourced data, cryptographic file systems in distributed networks, and access control of outsourced data. Different variations of PDP protocols […]