Torrent Poisoning Protection with a Reverse Proxy Server
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. The participants in this attack are usually compromised/infect...
Main Authors: | António Godinho, José Rosado, Filipe Sá, Filipe Caldeira, Filipe Cardoso |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-12-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/1/165 |
Similar Items
-
Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight
by: Sharyar Wani, et al.
Published: (2021-01-01) -
ARTP: Anomaly based real time prevention of Distributed Denial of Service attacks on the web using machine learning approach
by: P. Krishna Kishore, et al.
Published: (2023-01-01) -
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey
by: Zawar Shah, et al.
Published: (2022-01-01) -
Entropic DDoS Detection for Quantum Networks
by: Del Rajan
Published: (2022-12-01) -
On Distributed Denial of Service Current Defense Schemes
by: Seth Djane Kotey, et al.
Published: (2019-01-01)