• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

machine learning

Anomaly-based DDoS Attack Detection, According to Tezpur University Researchers

April 20, 2018 By TheNewsTeam

Researchers in the Department of Computer Science & Engineering at Tezpur University, located in Assam, India published a long essay on Anomaly based DDoS Attack Detection in 2015 in the International Journal of Computer Applications. What … [Read more...] about Anomaly-based DDoS Attack Detection, According to Tezpur University Researchers

Princeton Machine Learning Detection of IoT DDoS

April 20, 2018 By TheNewsTeam

Researchers at Princeton just published a set of encouraging results showing that real-time detection of IoT DDoS attacks is possible using machine learning techniques. The Princeton team decided to focus on detecting IoT DDoS attacks because of … [Read more...] about Princeton Machine Learning Detection of IoT DDoS

Big Data Analysis and DDoS

March 23, 2018 By TheNewsTeam

Big data aims to offer an answer to the outdated nature of detection appliances by offering the ability to baseline based on network-wide data, which increases accuracy of detection. A machine learning approach allows for greater granularity of … [Read more...] about Big Data Analysis and DDoS

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.