Botnet in DDoS attacks: trends and challenges

N Hoque, DK Bhattacharyya… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due
to rapid development of computer networks and associated infrastructure, and millions of …

[HTML][HTML] Packet analysis for network forensics: A comprehensive survey

LF Sikos - Forensic Science International: Digital Investigation, 2020 - Elsevier
Packet analysis is a primary traceback technique in network forensics, which, providing that
the packet details captured are sufficiently detailed, can play back even the entire network …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y **ao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

Network traffic classification using correlation information

J Zhang, Y **ang, Y Wang, W Zhou… - … on Parallel and …, 2012 - ieeexplore.ieee.org
Traffic classification has wide applications in network management, from security monitoring
to quality of service measurements. Recent research tends to apply machine learning …

Low-rate DDoS attacks detection and traceback by using new information metrics

Y **ang, K Li, W Zhou - IEEE transactions on information …, 2011 - ieeexplore.ieee.org
A low-rate distributed denial of service (DDoS) attack has significant ability of concealing its
traffic because it is very much like normal traffic. It has the capacity to elude the current …

Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks

A Chonka, Y **ang, W Zhou, A Bonti - Journal of Network and Computer …, 2011 - Elsevier
Cloud computing is still in its infancy in regards to its software as services (SAS), web
services, utility computing and platform as services (PAS). All of these have remained …

Internet traffic classification by aggregating correlated naive bayes predictions

J Zhang, C Chen, Y **ang, W Zhou… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
This paper presents a novel traffic classification scheme to improve classification
performance when few training data are available. In the proposed scheme, traffic flows are …

Traceback of DDoS attacks using entropy variations

S Yu, W Zhou, R Doss, W Jia - IEEE transactions on parallel …, 2010 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the
memoryless feature of the Internet routing mechanisms makes it extremely hard to trace …

TRACE: Real-time compression of streaming trajectories in road networks

T Li, L Chen, CS Jensen, TB Pedersen - Proceedings of the VLDB …, 2021 - vbn.aau.dk
The deployment of vehicle location services generates increasingly massive vehicle
trajectory data, which incurs high storage and transmission costs. A range of studies target …

SketchINT: Empowering INT with TowerSketch for per-flow per-switch measurement

K Yang, S Long, Q Shi, Y Li, Z Liu, Y Wu… - … on Parallel and …, 2023 - ieeexplore.ieee.org
Network measurement is indispensable to network operations. INT solutions that can
provide fine-grained per-switch per-packet information serve as promising solutions for per …