A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …
Survey of network-based defense mechanisms countering the DoS and DDoS problems
T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …
proposed for defense against these attacks. In this survey, we analyze the design decisions …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
Security testbed for Internet-of-Things devices
The Internet of Things (IoT) is a global ecosystem of information and communication
technologies aimed at connecting any type of object (thing), at any time, and in any place, to …
technologies aimed at connecting any type of object (thing), at any time, and in any place, to …
Bohatei: Flexible and elastic {DDoS} defense
DDoS defense today relies on expensive and proprietary hardware appliances deployed at
fixed locations. This introduces key limitations with respect to flexibility (eg, complex routing …
fixed locations. This introduces key limitations with respect to flexibility (eg, complex routing …
A taxonomy of DDoS attack and DDoS defense mechanisms
J Mirkovic, P Reiher - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety
of both the attacks and the defense approaches is overwhelming. This paper presents two …
of both the attacks and the defense approaches is overwhelming. This paper presents two …
Measuring ISP topologies with Rocketfuel
To date, realistic ISP topologies have not been accessible to the research community,
leaving work that depends on topology on an uncertain footing. In this paper, we present …
leaving work that depends on topology on an uncertain footing. In this paper, we present …
DDoS attacks and defense mechanisms: classification and state-of-the-art
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest
security problems in today's Internet. Of particular concern are Distributed Denial of Service …
security problems in today's Internet. Of particular concern are Distributed Denial of Service …
The crossfire attack
MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …
Aggregate-based congestion control for pulse-wave DDoS defense
Pulse-wave DDoS attacks are a new type of volumetric attack formed by short, high-rate
traffic pulses. Such attacks target the Achilles' heel of state-of-the-art DDoS defenses: their …
traffic pulses. Such attacks target the Achilles' heel of state-of-the-art DDoS defenses: their …