Survey of network-based defense mechanisms countering the DoS and DDoS problems

T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …

Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges

K Singh, P Singh, K Kumar - Computers & security, 2017 - Elsevier
Abstract Application layer Distributed Denial of Service (DDoS) attacks have empowered
conventional flooding based DDoS with more subtle attacking methods that pose an ever …

DDoS attack protection in the era of cloud computing and software-defined networking

B Wang, Y Zheng, W Lou, YT Hou - Computer Networks, 2015 - Elsevier
Cloud computing has become the real trend of enterprise IT service model that offers cost-
effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is …

Image-based CAPTCHA generation system

JZ Wang, R Datta, J Li - US Patent 7,929,805, 2011 - Google Patents
In a system and method for the generation of attack-resistant, user-friendly, image-based
CAPTCHAs (Completely Automated Public test to Tell Computers and Humans Apart) …

[LIBRO][B] Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security)

J Mirkovic, S Dietrich, D Dittrich, P Reiher - 2004 - dl.acm.org
Suddenly your Web server becomes unavailable. When you investigate, you realize that a
flood of packets is surging into your network. You have just become one of the hundreds of …

[PDF][PDF] Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds

S Kandula, D Katabi, M Jacob, A Berger - Proceedings of the 2nd …, 2005 - usenix.org
Recent denial of service attacks are mounted by professionals using Botnets of tens of
thousands of compromised machines. To circumvent detection, attackers are increasingly …

Certificateless public key encryption without pairing

J Baek, R Safavi-Naini, W Susilo - International conference on information …, 2005 - Springer
Abstract “Certificateless Public Key Cryptography” has very appealing features, namely it
does not require any public key certification (cf. traditional Public Key Cryptography) nor …

DDoS defense by offense

M Walfish, M Vutukuru, H Balakrishnan… - Proceedings of the …, 2006 - dl.acm.org
This paper presents the design, implementation, analysis, and experimental evaluation of
speak-up, a defense against application-level distributed denial-of-service (DDoS), in which …

[PDF][PDF] An approach to personnel selection based on SWARA and WASPAS methods

D Karabašević, D Stanujkić, S Urošević… - Bizinfo (Blace), 2016 - academia.edu
Human resource management is consisted of all activities that are aimed at ensuring
continuous development, satisfying the needs of employees, motivation and retention of …

Edos-shield-a two-steps mitigation technique against edos attacks in cloud computing

MH Sqalli, F Al-Haidari, K Salah - 2011 Fourth IEEE …, 2011 - ieeexplore.ieee.org
Cloud computing is currently one of the most hyped information technology fields and it has
become one of the fastest growing segments of IT. Cloud computing allows us to scale our …