A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …
Security and privacy in cloud computing
Z **ao, Y **ao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …
However, when outsourcing the data and business application to a third party causes the …
[PDF][PDF] Poseidon: Mitigating volumetric ddos attacks with programmable switches
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …
Identifying a denial-of-service attack in a cloud-based proxy service
LH Holloway, SN Rao, MB Prince, MPF Tourne… - US Patent …, 2013 - Google Patents
BACKGROUND Denial-of-Service (DoS) attacks are becoming more com monplace on the
Internet and are difficult to detect and miti gate. Generally speaking, a DoS attack is …
Internet and are difficult to detect and miti gate. Generally speaking, a DoS attack is …
Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …
Survey of network-based defense mechanisms countering the DoS and DDoS problems
T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …
proposed for defense against these attacks. In this survey, we analyze the design decisions …
Method and system for detecting malicious and/or botnet-related domain names
R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN
Abstract Software Defined Networking provides new functionalities to easily manage,
configure, and optimize network resources by introducing a clear separation between the …
configure, and optimize network resources by introducing a clear separation between the …
Method and system for detecting and responding to attacking networks
D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …
network of computers, comprising: collecting Domain Name System (DNS) data for the …
An advanced hybrid peer-to-peer botnet
A “botnet” consists of a network of compromised computers controlled by an attacker
(“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be …
(“botmaster”). Recently, botnets have become the root cause of many Internet attacks. To be …