Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB De Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

[PDF][PDF] Smart-phone attacks and defenses

C Guo, HJ Wang, W Zhu - hotnets III, 2004 - Citeseer
ABSTRACT бвгдевдг жзи йддв де дзг в вг д де евде гжд е! зв! д де зи д г" е ди# д де в" и
гж зв ждед# зв г д ед гд з дии зв! вге де в е зг в# де $ и вз" в зг ви% д& &# гже" ж и зег $ ж …

A systematic review of IP traceback schemes for denial of service attacks

K Singh, P Singh, K Kumar - Computers & Security, 2016 - Elsevier
Internet has always been vulnerable to a variety of security threats as it was originally
designed without apprehending the prospect of security concerns. Modern era has seen …

IP traceback with deterministic packet marking

A Belenky, N Ansari - IEEE communications letters, 2003 - ieeexplore.ieee.org
We propose a new approach for IP traceback which is scalable and simple to implement,
and introduces no bandwidth and practically no processing overhead. It is backward …

Traceback of DDoS attacks using entropy variations

S Yu, W Zhou, R Doss, W Jia - IEEE transactions on parallel …, 2010 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the
memoryless feature of the Internet routing mechanisms makes it extremely hard to trace …

Distributed denial of service attack detection using an ensemble of neural classifier

PAR Kumar, S Selvakumar - Computer Communications, 2011 - Elsevier
The vulnerabilities in the Communication (TCP/IP) protocol stack and the availability of more
sophisticated attack tools breed in more and more network hackers to attack the network …

Flexible deterministic packet marking: An IP traceback system to find the real source of attacks

Y **ang, W Zhou, M Guo - IEEE Transactions on Parallel and …, 2008 - ieeexplore.ieee.org
IP traceback is the enabling technology to control Internet crime. In this paper we present a
novel and practical IP traceback system called Flexible Deterministic Packet Marking …

Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems

PAR Kumar, S Selvakumar - Computer Communications, 2013 - Elsevier
A DDoS attack is the most prevalent threat, viz., flooding the computing and communication
resources in order to make the service unavailable for legitimate users, since a decade and …

DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis

ZM Fadlullah, T Taleb, AV Vasilakos… - IEEE/ACM …, 2010 - ieeexplore.ieee.org
The unbridled growth of the Internet and the network-based applications has contributed to
enormous security leaks. Even the cryptographic protocols, which are used to provide …

Low rate TCP denial-of-service attack detection at edge routers

A Shevtekar, K Anantharam… - IEEE Communications …, 2005 - ieeexplore.ieee.org
Low rate TCP denial-of-service attacks are a new type of DoS attacks that are carefully
orchestrated to exploit the fixed minimum TCP RTO property and thereby deny services to …