IEEE Organizations related to Distributed Denial-of-service Attack

Back to Top

No organizations are currently tagged "Distributed Denial-of-service Attack"



Conferences related to Distributed Denial-of-service Attack

Back to Top

IECON 2020 - 46th Annual Conference of the IEEE Industrial Electronics Society

IECON is focusing on industrial and manufacturing theory and applications of electronics, controls, communications, instrumentation and computational intelligence.


SoutheastCon 2020

SoutheastCon is the annual Region 3 conference that brings together engineering professionals, students, and volunteers for a weekend of technical presentations, meetings, student competitions, and volunteer education.

  • SoutheastCon 2021

    IEEE SoutheastCon is the annual IEEE Region 3 Student, Professional, and awards conference.

  • SoutheastCon 2019

    The annual IEEE SoutheastCon conferences promote all aspects of theories and applications of engineering disciplines. Sponsored by the IEEE Region-3 and IEEE Huntsville Section, this event will attract researchers, professionals, and students from the Southeastern region of the U.S. SoutheastCon 2019 will feature tutorial sessions, workshops, Technical Programs, and student Hardware, Software, Ethics, Paper, Web competitions.

  • SoutheastCon 2018

    SoutheastCon is a annual conference held in Region 3 and covers a Professional Track, Student Track and Regional Track.

  • SoutheastCon 2017

    Broad scope professional paper conference, region 3 annual meeting, region 3 annual student conference

  • SoutheastCon 2016

    Annual Region 3 Trifecta of Student competitions, Technical papers and volunteer training and administration.

  • SoutheastCon 2015

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • SOUTHEASTCON 2014

    Horizontal Technical Conference with all topics; students compete in multiple competions; Region 3 training meetings.

  • IEEE SOUTHEASTCON 2013

    Region 3 Meeting, Technical papers, student competitions.

  • SOUTHEASTCON 2012

    The annual IEEE SoutheastCon conferences promote all aspects of the theories and applications of the engineering disciplines. Sponsored by the IEEE Region 03, this event attracts researchers, professionals, and students from the Southeast region of the U.S and beyond. SoutheastCon 2012 will be held in Orlando, Florida.

  • SOUTHEASTCON 2011

    IEEE SoutheastCon2011 is the annual IEEE Region 3 technical, professional, and student conference, invites conference refereed and non-refereed technical paper presentations and tutorials that advance the work and careers of conference attendees in the areas of interest for the conference.

  • SOUTHEASTCON 2010

    SoutheastCon 2010 is the Region 3 event which includes a student conference, a technical conference, and the Region 3 business meeting.

  • SOUTHEASTCON 2009

    It is the annual IEEE Region 3 Technical, Professional, and Student Conference. As the premier conference for the IEEE Region 3, it brings together electrical, computer and other engineering and science professionals, faculty and students to share the latest information through technical sessions, tutorials and exhibits. The conference schedule includes: a technical program with seminars, tutorials, and workshops; exhibits; a student program with student competitions; and IEEE regional meetings.

  • SOUTHEASTCON 2008

    SoutheastCon is the Southeastern USA Region of the IEEE's premier conference. It contains three main sections: a technical program, student competitions and regional meetings. SouthEastCon features technical papers, tutorials and exhibits.

  • SOUTHEASTCON 2007

  • SOUTHEASTCON 2006

  • SOUTHEASTCON 2005

  • SOUTHEASTCON 2004

  • SOUTHEASTCON 2003

  • SOUTHEASTCON 2002

  • SOUTHEASTCON 2001

  • SOUTHEASTCON 2000

  • SOUTHEASTCON '99

  • SOUTHEASTCON '98

  • SOUTHEASTCON '97

  • SOUTHEASTCON '96


2019 14th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Artificial Intelligence, Control and Systems, Cyber-physical Systems, Energy and Environment, Industrial Informatics and Computational Intelligence, Robotics, Network and Communication Technologies, Power Electronics, Signal and Information Processing


2019 19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)

Cluster Computing, Grid Computing, Edge Computing, Cloud Computing, Parallel Computing, Distributed Computing


2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


More Conferences

Periodicals related to Distributed Denial-of-service Attack

Back to Top

No periodicals are currently tagged "Distributed Denial-of-service Attack"


Most published Xplore authors for Distributed Denial-of-service Attack

Back to Top

Xplore Articles related to Distributed Denial-of-service Attack

Back to Top

Distributed denial of service attack and defense

2010 International Conference on Educational and Information Technology, 2010

A distributed denial of service attack (DDoS) is adopted to hackers often attack means. The paper introduces the denial of service attack types, introduces DDoS attack the principle and the steps, Combined with the more common Syn Flood Attack principle, The actual defenses and DDoS.


A rate limiting mechanism for defending against flooding based distributed denial of service attack

2011 World Congress on Information and Communication Technologies, 2011

The distributed denial of service attack is a major threat to current internet security. One of the most threatening type is flooding based DDoS attack. In this paper we have proposed a defense mechanism for flooding based DDoS attack based on the concept of rate limiting the attack traffic The propose defense framework consist of three major components, detection, IP ...


Anomaly Based Distributed Denial of Service Attack Detection and Prevention with Machine Learning

2018 2nd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 2018

Everyday., the DoS/DDoS attacks are increasing all over the world and the ways attackers are using changing continuously. This increase and variety on the attacks are affecting the governments, institutions, organizations and corporations in a bad way. Every successful attack is causing them to lose money and lose reputation in return. This paper presents an introduction to a method which ...


Early Detection of Distributed Denial of Service Attack in Era of Software-Defined Network

2018 Eleventh International Conference on Contemporary Computing (IC3), 2018

A Distributed Denial of Service (DDoS) attack try to make services or resources unavailable to legitimate customers of that service or resource. These attacks are relatively easy to perform and extremely hard to detect in early stages. Different types of detection techniques were proposed by researcher to detect DDoS in its early stages but due to closed nature of networking ...


Detecting distributed denial-of-service attack traffic by statistical test

2008 Third International Conference on Communications and Networking in China, 2008

This study has proposed a new detection method for DDoS attack traffic based on statistical test. We first investigate the statistics of SYN arrival rate and find that SYN arrival rate can be can be modeled by normal distribution. We set up a threshold for maximum arrival rate to detect DDoS flood traffic. We also establish a threshold for incomplete ...


More Xplore Articles

Educational Resources on Distributed Denial-of-service Attack

Back to Top

IEEE-USA E-Books

  • Distributed denial of service attack and defense

    A distributed denial of service attack (DDoS) is adopted to hackers often attack means. The paper introduces the denial of service attack types, introduces DDoS attack the principle and the steps, Combined with the more common Syn Flood Attack principle, The actual defenses and DDoS.

  • A rate limiting mechanism for defending against flooding based distributed denial of service attack

    The distributed denial of service attack is a major threat to current internet security. One of the most threatening type is flooding based DDoS attack. In this paper we have proposed a defense mechanism for flooding based DDoS attack based on the concept of rate limiting the attack traffic The propose defense framework consist of three major components, detection, IP traceback and bandwidth control component. The proposed defense system is a distributed mechanism because it is deployed on all edge routers of the network. Our defense algorithm that is bandwidth control algorithm mainly tries to keep the server load within the maximum and minimum server load limits. The bandwidth control component at the victim end set up rate limits according to server load and source end traffic rate with the help of bandwidth control component at source end. The proposed rate limiting scheme will penalize the different attackers based on their rate limits and server load. The rate limit value for each attacker router is calculated dynamically. The victim end defense system decrease the rate limit exponentially and increase it linearly based on the attack traffic rate.

  • Anomaly Based Distributed Denial of Service Attack Detection and Prevention with Machine Learning

    Everyday., the DoS/DDoS attacks are increasing all over the world and the ways attackers are using changing continuously. This increase and variety on the attacks are affecting the governments, institutions, organizations and corporations in a bad way. Every successful attack is causing them to lose money and lose reputation in return. This paper presents an introduction to a method which can show what the attack and where the attack based on. This is tried to be achieved with using clustering algorithm DBSCAN on network traffic because of the change and variety in attack vectors.

  • Early Detection of Distributed Denial of Service Attack in Era of Software-Defined Network

    A Distributed Denial of Service (DDoS) attack try to make services or resources unavailable to legitimate customers of that service or resource. These attacks are relatively easy to perform and extremely hard to detect in early stages. Different types of detection techniques were proposed by researcher to detect DDoS in its early stages but due to closed nature of networking devices, no promising results were produced. However, with the advents of Software-Defined Network (SDN), situation has changed. SDN is a cutting edge technology, which separates control plane from data plane. Its features, like programmability and centralized view of network, can be used to overcome the difficulties faced by researches. In this paper, we discussed different detection techniques of DDoS and how these techniques can be made more effective by leveraging the unique features of SDN.

  • Detecting distributed denial-of-service attack traffic by statistical test

    This study has proposed a new detection method for DDoS attack traffic based on statistical test. We first investigate the statistics of SYN arrival rate and find that SYN arrival rate can be can be modeled by normal distribution. We set up a threshold for maximum arrival rate to detect DDoS flood traffic. We also establish a threshold for incomplete three-way handshaking packet ratio to detect possible DDoS traffic. The experiment results show that the possibilities of both false positives and false negatives are very low. The proposed mechanism is demonstrated to have the capability of detecting DDoS attack accurately.

  • An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack

    Software Defined Network (SDN) architecture is a new and novel way of network management mechanism. In SDN, switches do not process the incoming packets like conventional network computing environment. They match for the incoming packets in the forwarding tables and if there is none it will be sent to the controller for processing which is the operating system of the SDN. A Distributed Denial of Service (DDoS) attack is a biggest threat to cyber security in SDN network. The attack will occur at the network layer or the application layer of the compromised systems that are connected to the network. In this paper a machine learning based intelligent method is proposed which can detect the incoming packets as infected or not. The different machine learning algorithms adopted for accomplishing the task are Naive Bayes, K-Nearest neighbor (KNN) and Support vector machine (SVM) to detect the anomalous behavior of the data traffic. These three algorithms are compared according to their performances and KNN is found to be the suitable one over other two. The performance measure is taken here is the detection rate of infected packets.

  • Amplified Distributed Denial of Service Attack in Software Defined Networking

    Software Defined Networking (SDN) is an alternative networking paradigm that provides flexible network management through the separation between data plane and control plane functionalities. This separation results in extensive communication between control and data plane, which can result in a severe bottleneck for the whole network, under high traffic conditions. Moreover, researchers shown that an adversary can exploit this bottleneck to mount a powerful Denial of Service attack on the control plane, known as Control Plane Saturation Attack (CPSA). In this paper, we provide a thorough analysis of the CPSA, and in particular we show how it can be amplified by long forwarding paths in an SDN network. We prove the effectiveness of the attack through extensive testing using OpenFlow, the most widely adopted control-data plane communication protocol for SDN. Our evaluation shows that, when the forwarding path length in increased by 5 times, the attacker can leverage a 55% decrease in the attack rate required to incapacitate the network.

  • Improved Detection Approach for Distributed Denial of Service Attack Based on SVM

    The intrusion detection rate is greatly influenced by the parameters of the support vector machine (SVM) model. In order to overcome the parameter limits to improve the identify accuracy of Distributed Denial of Service (DDoS) attack, this paper presents a new detection method based on Kernel Principle Component Analysis (KPCA) and Particle Swarm Optimization (PSO)-Support Vector Machine (SVM). The KPCA was used to obtain the important characteristics of the intrusion data to eliminate the redundant features. Then the PSO was used to optimize the SVM parameters. Experimental results show the proposed approach can enhance the detection rate, and performs better than the PCA based methods.

  • Detecting Distributed Denial of Service Attack Traffic at the Agent Machines

    Due to financial losses caused by distributed denial of service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We believe this paradigm should change in order to tackle the DDoS threat in its basis: thwart agent machines participation in DDoS attacks. Our proposal consists of developing an agent to monitor the packet traffic rate (outgoing packets/incoming packets). Our first deployment is based upon characterizing TCP connections; normal TCP connections can be characterized by the ratio of the sent packets to the received packets from a given destination. Preliminary results have shown that the traffic ratio values usually present larger values at the beginning of the run when there are not enough packets to make a decision on whether or not traffic is legitimate. A low value for threshold allows for faster attack detection, but it also increases the number of false-positives

  • Implementation of honeypot to detect and prevent distributed denial of service attack

    Securing communication is a comprehensive challenge due to the increasing of threats and attacks to network security. By knowing the various of threats and attacks, we can collect broad data from the network, by using honeypot. Implemented honeypot uses low-interaction type that is honeyd and other supporting software such as apache2 and bind9. Based on the research, honeypot is successfully giving responds to Distributed Denial of Service (DDoS) attacks and giving false information such as operation system and open ports which are usually sought by attackers. Log outcome given by honeypot is processed into chart and diagrams which are shown through the network interface by using honeyd-viz software so that the administrator will find it easy to analyze the form of the attacks from the attackers and it also can be used to increase the security of the server.



Standards related to Distributed Denial-of-service Attack

Back to Top

No standards are currently tagged "Distributed Denial-of-service Attack"


Jobs related to Distributed Denial-of-service Attack

Back to Top