High-Speed Network DDoS Attack Detection: A Survey
Having a large number of device connections provides attackers with multiple ways to attack
a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can …
a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can …
Jaqen: A {High-Performance}{Switch-Native} approach for detecting and mitigating volumetric {DDoS} attacks with programmable switches
The emergence of programmable switches offers a new opportunity to revisit ISP-scale
defenses for volumetric DDoS attacks. In theory, these can offer better cost vs. performance …
defenses for volumetric DDoS attacks. In theory, these can offer better cost vs. performance …
[PDF][PDF] Poseidon: Mitigating volumetric ddos attacks with programmable switches
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …
{ICARUS}: Attacking low earth orbit satellite networks
Internet service based on low Earth orbit satellites is generating immense excitement in the
networking community due to its potential for global low-latency connectivity. Despite the …
networking community due to its potential for global low-latency connectivity. Despite the …
In-network volumetric DDoS victim identification using programmable commodity switches
Volumetric distributed Denial-of-Service (DDoS) attacks have become one of the most
significant threats to modern telecommunication networks. However, most existing defense …
significant threats to modern telecommunication networks. However, most existing defense …
Moving Target Defense‐Based Denial‐of‐Service Mitigation in Cloud Environments: A Survey
With the increased frequency and intensity of denial‐of‐service (DoS) attacks on critical
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …
United we stand: Collaborative detection and mitigation of amplification ddos attacks at scale
Amplification Distributed Denial of Service (DDoS) attacks' traffic and harm are at an all-time
high. To defend against such attacks, distributed attack mitigation platforms, such as traffic …
high. To defend against such attacks, distributed attack mitigation platforms, such as traffic …
An evolutionary study of IoT malware
Recent years have witnessed lots of attacks targeted at the widespread Internet of Things
(IoT) devices and malicious activities conducted by compromised IoT devices. After some …
(IoT) devices and malicious activities conducted by compromised IoT devices. After some …
Per-host DDoS mitigation by direct-control reinforcement learning
DDoS attacks plague the availability of online services today, yet like many cybersecurity
problems are evolving and non-stationary. Normal and attack patterns shift as new protocols …
problems are evolving and non-stationary. Normal and attack patterns shift as new protocols …
Enabling performant, flexible and cost-efficient DDoS defense with programmable switches
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …