Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks"
written by Shweta Tripathi, Brij Gupta, Ammar Almomani, Anupama Mishra, Suresh Veluru,
published by Journal of Information Security, Vol.4 No.3, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Ddos attack detection through digital twin technique in metaverse
2023 IEEE …, 2023
[2] Machine Learning and Artificial Intelligence in Cybersecurity
2023
[3] Artificial intelligence model for DDOS-detection
2023
[4] Use of Blockchain in Crypto-Currency to secure cloud forensic trails
Trinity Journal of Management, IT & Media …, 2023
[5] IoT Security using Machine Learning Techniques
Cyber Security Insights Magazine, 2022
[6] Cyber Security Traits of a Future-Ready Organization
Cyber Security Insights Magazine, 2022
[7] Cloud data assured deletion scheme based on dynamic sliding window
Peer-to-Peer Networking and Applications, 2022
[8] DDoSDet: An approach to Detect DDoS attacks using Neural Networks
arXiv preprint arXiv:2201.09514, 2022
[9] Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue
Journal of Information Security, 2022
[10] Detection of DDOS Attack Using IDS Mechanism: A Review
2022 1st International …, 2022
[11] Edge Computing-Based DDoS Attack Detection for Intelligent Transportation Systems
Cyber Security, Privacy and Networking, 2022
[12] A Deep and Efficient Analysis of DDOS Attack in Software Defined Network
2022
[13] A Comparative Analysis of Machine Learning-Based Website Phishing Detection Using URL Information
2022 5th International …, 2022
[14] Decentralized approach for data security of Medical IoT Devices
… Conference on Smart …, 2021
[15] The Presentation of a New Defense Framework Against the Distributed Denial of Service Attacks Using the Software Defined Network
journal of Advanced …, 2021
[16] Analysis of Machine Learning Based DDoS Attack Detection Techniques in Software Defined Network
2021
[17] Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks
International Conference on …, 2021
[18] An Integrated BIM-IoT approach to support energy monitoring
… Conference on Smart …, 2021
[19] A big data and deep learning based approach for ddos detection in cloud computing environment
2021 IEEE 10th Global …, 2021
[20] How IoT is Making DDoS Attacks More Dangerous
2021
[21] Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments
2021
[22] Analysis of Machine learning based XSS attack Detection Techniques
2021
[23] Advancement of Cloud Computing and Big Data Analytics in Healthcare Sector Security
2021
[24] Challenges of the System and Network Administration
2021
[25] A lightweight Anomaly based DDoS flood attack detection for Internet of vehicles
2020
[26] Denial of Service Attacks: Difference in Rates, Duration, and Financial Damages and the Relationship Between Company Assets and Revenues
2020
[27] A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets
2020
[28] Uma Metodologia para análise de incidentes de segurança da informação
2020
[29] Cross-site Scripting Attacks: Classification, Attack, and Countermeasures
2020
[30] An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks
2020
[31] The detection method of low-rate DoS attack based on multi-feature fusion
2020
[32] A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms
2020
[33] Ways to eliminate DDos attacks
2020
[34] Методы обнаружения и предотвращения DDOS-атак
2019
[35] Applying Multi-Level Theory to an Information Security Incident Domain Ontology.
2019
[36] Systematic review of aspects of DDoS attacks detection
2019
[37] Applying Multi-Level Theory to an Information Security Incident Domain Ontology
2019
[38] A Review on Detection of DDOS Attack Using Machine Learning and Deep Learning Techniques
2019
[39] Développement d'un protocole SCADA temps réel sécurisé à base de l'IEC 60870-5-101
2019
[40] Smart Card Security: Applications, Attacks, and Countermeasures
2019
[41] DDoS Attacks—Analysis and Prevention
Innovations in Computer Science and Engineering, 2019
[42] An improved agent-based adaptive protection model for distributed denial of service flooding attack and flash crowd flooding traffic
2019
[43] The Impact of Crypto-Currency Risks on the Use of Blockchain for Cloud Security and Privacy
2018
[44] An efficient index structure for distributed k-nearest neighbours query processing
Soft Computing, 2018
[45] Fixing the Cloud Forensic Problem with Blockchain
2018
[46] Multi-agent-based DDoS detection on big data systems
2018
[47] Security Analytics Tools and Implementation Success Factors: Instrument Development Using Delphi Approach and Exploratory Factor Analysis
2018
[48] Could Block Chain Technology Help Resolve the Cloud Forensic Problem?
2018
[49] Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
2018
[50] Researching Cyber Weapons: An Enumerative Bibliography
Cyber Weaponry, 2018
[51] Network Anomaly Detection and Prevention using Statistical and Machine Learning Approaches
2018
[52] Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk
2018
[53] A Game Theory Model for Detection and Mitigation of Ddos Attacks on Web Servers
2018
[54] Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy.
2017
[55] Collaborative detection and filtering techniques against denial of service attacks in cloud computing
2017
[56] DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment
Security and Communication Networks, 2017
[57] COLLABORATIVE DETECTION AND FILTERING TECHNIQUES AGAINST DENIAL OF SERVICE ATTACKS IN CLOUD COMPUTING.
Journal of Theoretical and Applied Information Technology, 2017
[58] Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
Security and Communication Networks, 2017
[59] Using SDN Approach to Secure Cloud Servers against Flooding Based DDoS Attacks
2017
[60] Foreword
2017
[61] Data-Driven Anomaly Detection in Industrial Networks
2017
[62] An Empirical Study of The Impact of DoS, DDoS Attacks on Various Web Servers and Application Servers
Journal of Science and Technology on Information Security, 2017
[63] Denial of service attacks detection using synchronization packets analysis
2017
[64] Designing a Robust Closed-Loop Intrusion Detection Predictive Model Using Signal Processing Techniques in Cloud Computing Environment
2017
[65] Performance Improvement of MapReduce for Heterogeneous Clusters Based on Efficient Locality and Replica Aware Scheduling (ELRAS) Strategy
Wireless Personal Communications, 2017
[66] HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce
Security and Communication Networks, 2016
[67] Recent Developments on Security and Reliability in Large-Scale Data Processing with MapReduce
International Journal of Data Warehousing and Mining (IJDWM), 2016
[68] Graphics processing unit based next generation DDoS prevention system
2016
[69] Comparative analysis of features based machine learning approaches for phishing detection
2016
[70] A survey of cloud-based network intrusion detection analysis
2016
[71] BENEFITS AND CHALLENGES OF THE ADOPTION OF CLOUD COMPUTING IN BUSINESS
2016
[72] Recent survey of various defense mechanisms against phishing attacks
Journal of Information Privacy and Security, 2016
[73] Bigdata platform based approach for defending against DDoS
Int'l Conf. on Advances in Big Data Analytics, 2016
[74] Securing cloud computing.
2016
[75] Distributed Denial of Service Prevention Techniques
2015
[76] A Novel approach for Detection of Distributed Denial of Service attack in VANET
International Journal of Computer Applications, 2015
[77] Intrusion Detection and Countermeasure of Virtual Cloud Systems-State of the Art and Current Challenges
International Journal of Advanced Computer Science and Applications, 2015
[78] Safety of data warehouse for remote laboratories in Laboratory Management System and network of road junctions
2015
[79] Distributed Denial of Service (DDOS) Attack, Networks, Tools and DEFENSE.
International Journal of Applied Engineering Research, 2015
[80] Defending Against DDOS Flooding Attacks-A Data Streaming Approach
2015
[81] Analysis of Denial of Services (DOS) Attacks and Prevention Techniques
International Journal of Engineering Research and Technology, 2015
[82] Similarity Detection via Random Subsets for Cyber War Protection in Big Data using Hadoop Framework
2015
[83] Defence for Distributed Denial of Service Attacks in Cloud Computing
Procedia Computer Science, 2015
[84] DDoS detection and filtering technique in cloud environment using GARCH model
2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), 2015
[85] A Proactive Approach to Intrusion Detection in Cloud Software as a Service
Achieving Enterprise Agility through Innovative Software Development, 2015
[86] Botnet-originated DDoS attacks: Overview and Mitigation
2015
[87] Detection of DDoS attack in VANET using LPN (Local Protection Node)
2015
[88] THRESHOLD BASED APPROACH TO DETECT DDOS ATTACKS IN CLOUD
2014
[89] Defense against DoS attack: PSO approach in virtualization
2014
[90] Presenting a pattern for detection of denial of service attacks with web mining technique and fuzzy logic approach
2014
[91] An Efficient Attack Resistance Model Using Application Based Polynomial Distribution
2014
[92] Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed
International Journal of Fuzzy Systems, 2014
[93] Cyber Conflict Bibliography
GWU Legal Studies Research Paper, 2013
[94] Digital compensation for timing mismatches in interleaved ADCs
2013
[95] MINISTÉRIO DA DEFESA EXÉRCITO BRASILEIRO DEPARTAMENTO DE CIÊNCIA E TECNOLOGIA INSTITUTO MILITAR DE ENGENHARIA PROGRAMA DE …
[96] Malware Detection Techniques: A Comprehensive Study
[97] Evolving Conversational AI: Analyzing the Development and Advancements in ChatGPT
[98] Analysis of Rumour and Fake News Detection Techniques
[99] A MODEL OF PREVENTING DDOS ATTACK USING IN-HYPERVISOR HOST-BASED IDPS
[100] Ethical Considerations in the Deployment of AI Chatbots: Lessons from ChatGPT
[101] Building Resilience Trust and Security in the Evolution to 6G Networks
[102] The Crucial Role of Change Request Analysis in Enhancing 3GPP Security
[103] Data Privacy with Elliptic Curve Cryptography
[104] Advanced Techniques for Detecting Phishing URLs
[105] Cyber Security in Healthcare
[106] Analysing Ransomware Attacks and Strategies for Defence
[107] Enhancing Cyber Security in the Banking Sector with Chatbot Assistance
[108] Cybersecurity in Healthcare: Safeguarding the Integrity of Medical Imaging Data
[109] Understanding and Preventing Man-in-the-Middle Attacks in the Digital Age
[110] Machine Learning Approaches in Chatbots for Dynamic Detection of Malware and Viruses
[111] Exploring the Synergy of Blockchain and Federated Learning in Online Voting Systems
[112] Enhancing Phishing Detection Through Multilayer Perceptron in Cybersecurity
[113] An analysis of NLP (Natural Language Processing)
[114] Mastering NGINX: A Comprehensive Guide to Web Server Excellence
[115] A Meta-Learning Chatbot Assistance against Evolving Cyber-Attacks
[116] Enhancing Cybersecurity with 2FA and Future Chat-bot Integration
[117] The Future of Federated Learning: Collaborative Intelligence in a Decentralized World
[118] Enhancing Player Experience and Data Privacy: Federated Learning in Online Gaming Platforms
[119] Mechanism, Tools and Techniques to Mitigate Distributed Denial of Service Attacks
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top