A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks

ST Zargar, J Joshi, D Tipper - IEEE communications surveys & …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …

[HTML][HTML] Packet analysis for network forensics: A comprehensive survey

LF Sikos - Forensic Science International: Digital Investigation, 2020 - Elsevier
Packet analysis is a primary traceback technique in network forensics, which, providing that
the packet details captured are sufficiently detailed, can play back even the entire network …

A fog computing based approach to DDoS mitigation in IIoT systems

L Zhou, H Guo, G Deng - Computers & Security, 2019 - Elsevier
Distributed denial of service (DDoS) cyber-attack poses a severe threat to the industrial
Internet of Things (IIoT) operation due to the security vulnerabilities resulted from increased …

Traceback of DDoS attacks using entropy variations

S Yu, W Zhou, R Doss, W Jia - IEEE transactions on parallel …, 2010 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the
memoryless feature of the Internet routing mechanisms makes it extremely hard to trace …

Flexible deterministic packet marking: An IP traceback system to find the real source of attacks

Y **ang, W Zhou, M Guo - IEEE Transactions on Parallel and …, 2008 - ieeexplore.ieee.org
IP traceback is the enabling technology to control Internet crime. In this paper we present a
novel and practical IP traceback system called Flexible Deterministic Packet Marking …

[LIVRE][B] Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures

BB Gupta, A Dahiya - 2021 - taylorfrancis.com
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are
increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource …

Distributed denial of service attacks and defense mechanisms: current landscape and future directions

S Bhatia, S Behal, I Ahmed - Versatile Cybersecurity, 2018 - Springer
Societal dependence on Information and Communication Technology (ICT) over the past
two decades has brought with it an increased vulnerability to a large variety of cyber-attacks …

Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter

G Yao, J Bi, AV Vasilakos - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
It is long known attackers may use forged source IP address to conceal their real locations.
To capture the spoofers, a number of IP traceback mechanisms have been proposed …

Amplification and DRDoS attack defense--a survey and new perspectives

FJ Ryba, M Orlinski, M Wählisch, C Rossow… - arxiv preprint arxiv …, 2015 - arxiv.org
The severity of amplification attacks has grown in recent years. Since 2013 there have been
at least two attacks which involved over 300Gbps of attack traffic. This paper offers an …

A more practical approach for single-packet IP traceback using packet logging and marking

C Gong, K Sarac - IEEE Transactions on Parallel and …, 2008 - ieeexplore.ieee.org
Tracing IP packets to their origins is an important step in defending Internet against denial-of-
service attacks. Two kinds of IP traceback techniques have been proposed as packet …