Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Denial of Service Attacks

Applied Approach to Privacy and Security for the Internet of Things
A denial-of-service (DoS) attack is an attack intended to close down a machine or system, making it out of reach to its destination. DoS assaults achieve this by flooding the target with traffic or sending it data that prompts an accident.
Published in Chapter:
Anomaly Detection in IoT Frameworks Using Machine Learning
Phidahunlang Chyne (North-Eastern Hill University, India), Parag Chatterjee (National Technological University, Argentina & University of the Republic, Uruguay), Sugata Sanyal (Tata Institute of Fundamental Research, India), and Debdatta Kandar (North-Eastern Hill University, India)
DOI: 10.4018/978-1-7998-2444-2.ch004
Abstract
Rapid advancements in hardware programming and communication innovations have encouraged the development of internet-associated sensory devices that give perceptions and information measurements from the physical world. According to the internet of things (IoT) analytics, more than 100 IoT devices across the world connect to the internet every second, which in the coming years will sharply increase the number of IoT devices by billions. This number of IoT devices incorporates new dynamic associations and does not totally replace the devices that were purchased before yet are not utilized any longer. As an increasing number of IoT devices advance into the world, conveyed in uncontrolled, complex, and frequently hostile conditions, securing IoT frameworks displays various challenges. As per the Eclipse IoT Working Group's 2017 IoT engineer overview, security is the top worry for IoT designers. To approach the challenges in securing IoT devices, the authors propose using unsupervised machine learning model at the network/transport level for anomaly detection.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Context Awareness in Mobile Devices
This is where a machine or group of machines attack a system by 'flooding' it with many bogus requests which usually lead to this attacked machines becoming 'tied up' and thus failing.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR