Botnet in DDoS attacks: trends and challenges
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …
to rapid development of computer networks and associated infrastructure, and millions of …
[HTML][HTML] Packet analysis for network forensics: A comprehensive survey
LF Sikos - Forensic Science International: Digital Investigation, 2020 - Elsevier
Packet analysis is a primary traceback technique in network forensics, which, providing that
the packet details captured are sufficiently detailed, can play back even the entire network …
the packet details captured are sufficiently detailed, can play back even the entire network …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
Network traffic classification using correlation information
Traffic classification has wide applications in network management, from security monitoring
to quality of service measurements. Recent research tends to apply machine learning …
to quality of service measurements. Recent research tends to apply machine learning …
Low-rate DDoS attacks detection and traceback by using new information metrics
A low-rate distributed denial of service (DDoS) attack has significant ability of concealing its
traffic because it is very much like normal traffic. It has the capacity to elude the current …
traffic because it is very much like normal traffic. It has the capacity to elude the current …
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
Cloud computing is still in its infancy in regards to its software as services (SAS), web
services, utility computing and platform as services (PAS). All of these have remained …
services, utility computing and platform as services (PAS). All of these have remained …
Internet traffic classification by aggregating correlated naive bayes predictions
This paper presents a novel traffic classification scheme to improve classification
performance when few training data are available. In the proposed scheme, traffic flows are …
performance when few training data are available. In the proposed scheme, traffic flows are …
Traceback of DDoS attacks using entropy variations
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the
memoryless feature of the Internet routing mechanisms makes it extremely hard to trace …
memoryless feature of the Internet routing mechanisms makes it extremely hard to trace …
TRACE: Real-time compression of streaming trajectories in road networks
The deployment of vehicle location services generates increasingly massive vehicle
trajectory data, which incurs high storage and transmission costs. A range of studies target …
trajectory data, which incurs high storage and transmission costs. A range of studies target …
SketchINT: Empowering INT with TowerSketch for per-flow per-switch measurement
Network measurement is indispensable to network operations. INT solutions that can
provide fine-grained per-switch per-packet information serve as promising solutions for per …
provide fine-grained per-switch per-packet information serve as promising solutions for per …