Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges
N Agrawal, S Tapaswi - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
The salient features of cloud computing (such as on-demand self-service, resource pooling,
broad network access, rapid elasticity, and measured service) are being exploited by …
broad network access, rapid elasticity, and measured service) are being exploited by …
Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …
A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning
While there have been extensive studies of denial of service (DoS) attacks and DDoS attack
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …
mitigation, such attacks remain challenging to mitigate. For example, Low-Rate DDoS (LR …
Transport and application layer DDoS attacks detection to IoT devices by using machine learning and deep learning models
From smart homes to industrial environments, the IoT is an ally to easing daily activities,
where some of them are critical. More and more devices are connected to and through the …
where some of them are critical. More and more devices are connected to and through the …
Flow-based intrusion detection: Techniques and challenges
MF Umer, M Sher, Y Bi - Computers & Security, 2017 - Elsevier
Flow-based intrusion detection is an innovative way of detecting intrusions in high-speed
networks. Flow-based intrusion detection only inspects the packet header and does not …
networks. Flow-based intrusion detection only inspects the packet header and does not …
Detection of reduction-of-quality DDoS attacks using Fuzzy Logic and machine learning algorithms
Abstract Distributed Denial of Service (DDoS) attacks are still among the most dangerous
attacks on the Internet. With the advance of methods for detecting and mitigating these …
attacks on the Internet. With the advance of methods for detecting and mitigating these …
Security data collection and data analytics in the internet: A survey
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …
detect security threats and measure the security of the Internet arises a significant research …
Detecting distributed denial of service attacks: methods, tools and future directions
Distributed denial of service (DDoS) attack is a coordinated attack, generally performed on a
massive scale on the availability of services of a target system or network resources. Owing …
massive scale on the availability of services of a target system or network resources. Owing …
Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic
Internet applications are used in various sectors as it contributes in enhancing the system
usage in many respects. However, the interconnected computer systems and networks are …
usage in many respects. However, the interconnected computer systems and networks are …
RSU-based online intrusion detection and mitigation for VANET
Secure vehicular communication is a critical factor for secure traffic management. Effective
security in intelligent transportation systems (ITS) requires effective and timely intrusion …
security in intelligent transportation systems (ITS) requires effective and timely intrusion …