A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks

ST Zargar, J Joshi, D Tipper - IEEE communications surveys & …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …

Security and privacy in cloud computing

Z **ao, Y **ao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

[PDF][PDF] Poseidon: Mitigating volumetric ddos attacks with programmable switches

M Zhang, G Li, S Wang, C Liu, A Chen, H Hu… - the 27th Network and …, 2020 - par.nsf.gov
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …

Identifying a denial-of-service attack in a cloud-based proxy service

LH Holloway, SN Rao, MB Prince, MPF Tourne… - US Patent …, 2013 - Google Patents
BACKGROUND Denial-of-Service (DoS) attacks are becoming more com monplace on the
Internet and are difficult to detect and miti gate. Generally speaking, a DoS attack is …

Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

Survey of network-based defense mechanisms countering the DoS and DDoS problems

T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN

RF Fouladi, O Ermiş, E Anarim - Computer Networks, 2022 - Elsevier
Abstract Software Defined Networking provides new functionalities to easily manage,
configure, and optimize network resources by introducing a clear separation between the …

Method and system for detecting and responding to attacking networks

D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …

An advanced hybrid peer-to-peer botnet

P Wang, S Sparks, CC Zou - IEEE Transactions on Dependable …, 2008 - ieeexplore.ieee.org
A “botnet” consists of a network of compromised computers controlled by an attacker
(“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be …