A three-layer defense mechanism based on web servers against distributed denial of service attacks
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | A. T. Rakhmanov, Sh. K. Kamalov, K. F. Kerimov |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | International Scientific Technical Journal «Problems of Control and Informatics» |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001246369 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
Three-leveled System of Digital Libraries with "Client-Server” Technology
by: O. Kostyshyn, et al.
Published: (2002)
by: O. Kostyshyn, et al.
Published: (2002)
Client-server Web-oriented system with elements of analysis for organization of the election process within the work of assets student
by: V. M. Levytskyi, et al.
Published: (2020)
by: V. M. Levytskyi, et al.
Published: (2020)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Computer modeling and analysis of fluid flow in rivers using Web-applications from components based on ArcGIS Server
by: P. S. Venherskyi, et al.
Published: (2016)
by: P. S. Venherskyi, et al.
Published: (2016)
Automatic detection algorithm for vulnerability of SQL-injection
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
A model of control for counterac-ting against information attacks in cyberspace
by: A. A. Shyian, et al.
Published: (2021)
by: A. A. Shyian, et al.
Published: (2021)
Database protection based on web application firewall
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Analyzing the models of systems with heterogeneous servers
by: A. Z. Melikov, et al.
Published: (2020)
by: A. Z. Melikov, et al.
Published: (2020)
Detection and avoidance of input validation attacks in web application using deterministic push down automata
by: V. Nitja, et al.
Published: (2019)
by: V. Nitja, et al.
Published: (2019)
Security of Poseidon hash function against non-binary differential and linear attacks
by: L. Kovalchuk, et al.
Published: (2021)
by: L. Kovalchuk, et al.
Published: (2021)
On a system with retrial queue and unreliable server
by: Ye. O. Lebiediev, et al.
Published: (2020)
by: Ye. O. Lebiediev, et al.
Published: (2020)
Peculiarities of the court defense against defamation in the mass media
by: Z. Haladzhun
Published: (2010)
by: Z. Haladzhun
Published: (2010)
Security estimates of a Ring-LWE symmetric cryptosystem against chosen plaintext attack
by: S. M. Ignatenko
Published: (2020)
by: S. M. Ignatenko
Published: (2020)
Method of developing a web-application brandmauer
by: Kh. Khamdamov, et al.
Published: (2019)
by: Kh. Khamdamov, et al.
Published: (2019)
Semantic annotation of Web-services
by: Zakharova, O.V.
Published: (2017)
by: Zakharova, O.V.
Published: (2017)
Semantic annotation of Web-services
by: O. V. Zakharova
Published: (2015)
by: O. V. Zakharova
Published: (2015)
Asymptotic analysis of the system with server vacation and perishable inventory
by: V. S. Koroljuk, et al.
Published: (2017)
by: V. S. Koroljuk, et al.
Published: (2017)
Models of perishable queueing-inventory systems with server vacations
by: V. S. Koroljuk, et al.
Published: (2018)
by: V. S. Koroljuk, et al.
Published: (2018)
Three-dimensional nanoobjects in the layered dissipative environments of
by: Sh. Kahramanov, et al.
Published: (2015)
by: Sh. Kahramanov, et al.
Published: (2015)
Orthodox clergy motivation of their holy orders denial in the context of social-political transformation in 1920th
by: L. Babenko
Published: (2016)
by: L. Babenko
Published: (2016)
UkrVO Astronomical WEB Services
by: A. Mazhaev
Published: (2017)
by: A. Mazhaev
Published: (2017)
UkrVO Astronomical WEB Services
by: Mazhaev, A.
Published: (2017)
by: Mazhaev, A.
Published: (2017)
The development of an algorithm of evacuation plans in emergencies for client¬server architecture
by: V. E. Arutiunian
Published: (2019)
by: V. E. Arutiunian
Published: (2019)
Using the NEOS Server for Solving Two Classes of Optimization Problems
by: H. D. Bila, et al.
Published: (2022)
by: H. D. Bila, et al.
Published: (2022)
Security Justification for Strumok Stream Cipher Against Correlation Attacks Over Finite Fields of Characteristic 2
by: A. M. Oleksiichuk, et al.
Published: (2019)
by: A. M. Oleksiichuk, et al.
Published: (2019)
Metaheuristic methods for optimizing the quality of service of composite web services
by: Moroz, H.B.
Published: (2025)
by: Moroz, H.B.
Published: (2025)
Modeling of the optimal databases allocation of information systems by the availability of intermediate servers
by: R. P. Krasniuk, et al.
Published: (2018)
by: R. P. Krasniuk, et al.
Published: (2018)
Specification of the process of the semantic annotation the web services
by: O. V. Zakharova
Published: (2018)
by: O. V. Zakharova
Published: (2018)
Web service for enterprise resource management systems
by: Tarasenko, A.D., et al.
Published: (2022)
by: Tarasenko, A.D., et al.
Published: (2022)
Descriptive logic using in Web-service problems
by: Zakharova, O.V.
Published: (2017)
by: Zakharova, O.V.
Published: (2017)
Specification of the process of the semantic annotation the web services
by: Zakharova, O.V.
Published: (2018)
by: Zakharova, O.V.
Published: (2018)
Description of the web service process. Tabular interpretation
by: Reznichenko, V.A., et al.
Published: (2025)
by: Reznichenko, V.A., et al.
Published: (2025)
"New Wave” of the Ukrainian Drama in the Context of the Eighties of XX Century as the Denial of the Social-realistic Canon
by: L. O. Bondar
Published: (2007)
by: L. O. Bondar
Published: (2007)
Simulation and Visualization of Cyber Attacks in the Energy Sector Using Computer Distributed Training Systems
by: V. A. Gureev, et al.
Published: (2019)
by: V. A. Gureev, et al.
Published: (2019)
Web service discovery systems in service-oriented architecture: problems and solutions
by: Remarovych, S.S.
Published: (2017)
by: Remarovych, S.S.
Published: (2017)
Analysis and Optimization of M/G/l Vacation Queueing Systems with Server Timeout
by: Ibe, O.C.
Published: (2007)
by: Ibe, O.C.
Published: (2007)
Design and development of a software module for testing based on the MediaWiki server
by: V. O. Bolilyi, et al.
Published: (2022)
by: V. O. Bolilyi, et al.
Published: (2022)
Similar Items
-
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021) -
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016) -
Three-leveled System of Digital Libraries with "Client-Server” Technology
by: O. Kostyshyn, et al.
Published: (2002) -
Client-server Web-oriented system with elements of analysis for organization of the election process within the work of assets student
by: V. M. Levytskyi, et al.
Published: (2020) -
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)