A taxonomy of DDoS attack and DDoS defense mechanisms

J Mirkovic, P Reiher - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety
of both the attacks and the defense approaches is overwhelming. This paper presents two …

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris, A Mitrokotsa - Computer networks, 2004 - Elsevier
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest
security problems in today's Internet. Of particular concern are Distributed Denial of Service …

A comprehensive survey on DDoS attacks on various intelligent systems and it's defense techniques

A Gaurav, BB Gupta, W Alhalabi… - … Journal of Intelligent …, 2022 - Wiley Online Library
The purpose of this study is to provide an overview of distributed denial of service (DDoS)
attack detection in intelligent systems. In recent times, due to the endemic COVID‐19, the …

A recent survey on DDoS attacks and defense mechanisms

A Srivastava, BB Gupta, A Tyagi, A Sharma… - … Conference on Parallel …, 2011 - Springer
Abstract Distributed Denial-of-service (DDoS) attack is one of the most dangerous threats
that could cause devastating effects on the Internet. DDoS mainly started in 1998 but the …

[BOOK][B] Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)

J Mirkovic, S Dietrich, D Dittrich, P Reiher - 2004 - dl.acm.org
Suddenly your Web server becomes unavailable. When you investigate, you realize that a
flood of packets is surging into your network. You have just become one of the hundreds of …

Detecting distributed denial of service attacks: methods, tools and future directions

MH Bhuyan, HJ Kashyap… - The Computer …, 2014 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attack is a coordinated attack, generally performed on a
massive scale on the availability of services of a target system or network resources. Owing …

A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic

Z Zhou, A Gaurav, BB Gupta, H Hamdi… - Neural Computing and …, 2024 - Springer
Over the course of this year, more than a billion people have been afflicted by the COVID-19
outbreak. As long as individuals maintain their social distance, they should all be secure at …

[PDF][PDF] Sans institute infosec reading room

RF Rights - Risk, 2001 - picture.iczhiku.com
As Technology pushes the limits of removable media-so drives the need for a new file
system in order to support the larger capacities and faster access speeds being designed …

Analyzing distributed denial of service tools: The shaft case

S Dietrich, N Long - 14th Systems Administration Conference (LISA 2000 …, 2000 - usenix.org
In this paper we present an analysis of Shaft, an example of malware used in distributed
denial of service (DDoS) attacks. This relatively recent occurrence combines well-known …

Analysis of DDoS attacks and an introduction of a hybrid statistical model to detect DDoS attacks on cloud computing environment

A Girma, M Garuba, J Li, C Liu - 2015 12th International …, 2015 - ieeexplore.ieee.org
Cloud service availability has been one of the major concerns of cloud service providers
(CSP), while hosting different cloud based information technology services by managing …