A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services
The advent of cloud computing has made a global impact by providing on-demand services,
elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in …
elasticity, scalability, and flexibility, hence delivering cost-effective resources to end users in …
DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications
A Praseed, PS Thilagam - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks are some of the most devastating attacks
against Web applications. A large number of these attacks aim to exhaust the network …
against Web applications. A large number of these attacks aim to exhaust the network …
Application layer denial-of-service attacks and defense mechanisms: a survey
N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder
S Yadav, S Subramanian - 2016 international conference on …, 2016 - ieeexplore.ieee.org
An Application Layer Distributed Denial of Service Attack (DDoS) is one of the biggest
concerns for web security. Many detection methods are designed to mitigate DDoS attack …
concerns for web security. Many detection methods are designed to mitigate DDoS attack …
Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic
M Zolotukhin, T Hämäläinen… - 2016 23rd …, 2016 - ieeexplore.ieee.org
Nowadays, zero-day Denial-of-Service (DoS) attacks become frighteningly common in high-
speed networks due to constantly increasing number of vulnerabilities. Moreover, these …
speed networks due to constantly increasing number of vulnerabilities. Moreover, these …
Modelling behavioural dynamics for asymmetric application layer DDoS detection
A Praseed, PS Thilagam - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
Asymmetric application layer DDoS attacks using computationally intensive HTTP requests
are an extremely dangerous class of attacks capable of taking down web servers with …
are an extremely dangerous class of attacks capable of taking down web servers with …
An approach to application-layer DoS detection
With the massive resources and strategies accessible to attackers, countering Denial of
Service (DoS) attacks is getting increasingly difficult. One of these techniques is application …
Service (DoS) attacks is getting increasingly difficult. One of these techniques is application …
User behavior analytics-based classification of application layer HTTP-GET flood attacks
Web services are one of the most prominent forms of web presence exercised by the
businesses to connect to their possible client base. GET flood attacks, commonly known as …
businesses to connect to their possible client base. GET flood attacks, commonly known as …
Detection of application layer DDoS attack by modeling user behavior using logistic regression
S Yadav, S Selvakumar - 2015 4th International Conference on …, 2015 - ieeexplore.ieee.org
DDoS attack has been a threat to network security since a decade and it will continue to be
so in the near future also. Now a days application layer DDoS attack poses a major …
so in the near future also. Now a days application layer DDoS attack poses a major …
Application-layer DDoS defense with reinforcement learning
Application-layer distributed denial-of-service (L7 DDoS) attacks, by exploiting application-
layer requests to overwhelm functions or components of victim servers, have become a …
layer requests to overwhelm functions or components of victim servers, have become a …