Publication search
with distributed denial of service attacks as keyword
Nazih, Waleed Hifny, Yasser Elkilani, Wail S Dhahri, Habib Abdelkader, Tamer
Published in
Sensors (Basel, Switzerland)
Many companies have transformed their telephone systems into Voice over IP (VoIP) systems. Although implementation is simple, VoIP is vulnerable to different types of attacks. The Session Initiation Protocol (SIP) is a widely used protocol for handling VoIP signaling functions. SIP is unprotected against attacks because it is a text-based protocol ...
Alosaimi, Wael Zak, Michal Al-Begain, Khalid Alroobaea, Roobaea Masud, Mehedi
Published in
Cybernetics and Information Technologies
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups. Therefore, availability attacks, such as Denial of Service attacks (DoS); Distributed DoS attacks (DDoS) and Economical Denial of Sustainability (EDoS) attacks receive increasing...
Cabrera, João B. D. Lewis, Lundy Qin, Xinzhou Lee, Wenke Mehra, Raman K.
Published in
Journal of Network and Systems Management
Little or no integration exists today between Intrusion Detection Systems (IDSs) and SNMP-based Network Management Systems (NMSs), in spite of the extensive monitoring and alarming capabilities offered by commercial NMSs. This difficulty is mainly associated with the distinct data sources used by the two systems: packet traffic and audit records fo...