2017
DOI: 10.1007/s10586-017-0730-x
|View full text |Cite
|
Sign up to set email alerts
|

Denial of service attacks, defences and research challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 23 publications
0
6
0
1
Order By: Relevance
“…It explains the denial of sustainability, network security, and system security. It discusses the adversary effect of DoS attacks as one of the most significant obstacles to ensuring sustainable and secure systems [5].Using artificial neural networks [6], a system for the detection of known and unknown DDoS attacks was proposed. They have used a trained artificial neural network algorithm [22] to detect TCP, UDP, and ICMP attacks based on patterns that distinguish legitimate traffic from DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…It explains the denial of sustainability, network security, and system security. It discusses the adversary effect of DoS attacks as one of the most significant obstacles to ensuring sustainable and secure systems [5].Using artificial neural networks [6], a system for the detection of known and unknown DDoS attacks was proposed. They have used a trained artificial neural network algorithm [22] to detect TCP, UDP, and ICMP attacks based on patterns that distinguish legitimate traffic from DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Gupta 2017, Gupta andGupta 2018] Lista uma série de questões essenciais para uma interpretac ¸ão aprimorada das vulnerabilidades XSS e sua influência nas infraestruturas modernas das plataformas web. [Zlomislić et al 2017] Aborda a dificuldade de desenvolver uma defesa efetiva contra casos de ataques externos, como negac ¸ão de servic ¸o (Denial of Service ou DoS). Esses são citados como vulnerabilidades mais comuns nos sistemas e ameac ¸am constantemente aplicac ¸ões Web devido aos casos diferenciados.…”
Section: Vulnerabilidade Da Lista Owasp Top 10unclassified
“…There is a rich body of literature on cybersecurity management within commercial organisations. Plenty of research has been devoted to combating cybercrimes on the technical front, including the common threats organisations are facing (Saleem et al, 2017;Tounsi and Rais, 2018;Spremić and Šimunic, 2018), the technological challenges in addressing those threats (Stanciu and Tinca, 2017;Dambra et al, 2020;Zlomislić et al, 2017) and strategies to mitigate such challenges (Clim, 2019;Tselios et al, 2020;Chan et al, 2019). More recently, research has also focused on the human factors in managing cybersecurity risks for organisations of various sizes.…”
Section: The Role Of Iot Vendors and The Barriers They Are Facingmentioning
confidence: 99%