Survey of network-based defense mechanisms countering the DoS and DDoS problems
T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …
proposed for defense against these attacks. In this survey, we analyze the design decisions …
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges
Abstract Application layer Distributed Denial of Service (DDoS) attacks have empowered
conventional flooding based DDoS with more subtle attacking methods that pose an ever …
conventional flooding based DDoS with more subtle attacking methods that pose an ever …
DDoS attack protection in the era of cloud computing and software-defined networking
Cloud computing has become the real trend of enterprise IT service model that offers cost-
effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is …
effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is …
Image-based CAPTCHA generation system
In a system and method for the generation of attack-resistant, user-friendly, image-based
CAPTCHAs (Completely Automated Public test to Tell Computers and Humans Apart) …
CAPTCHAs (Completely Automated Public test to Tell Computers and Humans Apart) …
[LIBRO][B] Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)
Suddenly your Web server becomes unavailable. When you investigate, you realize that a
flood of packets is surging into your network. You have just become one of the hundreds of …
flood of packets is surging into your network. You have just become one of the hundreds of …
[PDF][PDF] Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
Recent denial of service attacks are mounted by professionals using Botnets of tens of
thousands of compromised machines. To circumvent detection, attackers are increasingly …
thousands of compromised machines. To circumvent detection, attackers are increasingly …
Certificateless public key encryption without pairing
Abstract “Certificateless Public Key Cryptography” has very appealing features, namely it
does not require any public key certification (cf. traditional Public Key Cryptography) nor …
does not require any public key certification (cf. traditional Public Key Cryptography) nor …
DDoS defense by offense
This paper presents the design, implementation, analysis, and experimental evaluation of
speak-up, a defense against application-level distributed denial-of-service (DDoS), in which …
speak-up, a defense against application-level distributed denial-of-service (DDoS), in which …
[PDF][PDF] An approach to personnel selection based on SWARA and WASPAS methods
Human resource management is consisted of all activities that are aimed at ensuring
continuous development, satisfying the needs of employees, motivation and retention of …
continuous development, satisfying the needs of employees, motivation and retention of …
Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing
Cloud computing is currently one of the most hyped information technology fields and it has
become one of the fastest growing segments of IT. Cloud computing allows us to scale our …
become one of the fastest growing segments of IT. Cloud computing allows us to scale our …