Flooding DDoS mitigation and traffic management with software defined networking

A Kalliola, K Lee, H Lee, T Aura - 2015 IEEE 4th International …, 2015 - ieeexplore.ieee.org
Mitigating distributed denial-of-service attacks can be a complex task due to the wide range
of attack types, attacker adaptation, and defender constraints. We propose a defense …

Anomaly-based intrusion detection by modeling probability distributions of flow characteristics

B Atli - 2017 - aaltodoc.aalto.fi
In recent years, with the increased use of network communication, the risk of compromising
the information has grown immensely. Intrusions have evolved and become more …

Network intrusion detection using flow statistics

BG Atli, Y Miche, A Jung - 2018 IEEE Statistical Signal …, 2018 - ieeexplore.ieee.org
The increasing use of network data within every aspect of human life, ranging from genetic
databases to credit card payments, urges for efficient methods for detecting any attempts …

Computing hierarchical summary of the data streams

Z Shah, AN Mahmood, M Barlow - Pacific-Asia Conference on Knowledge …, 2016 - Springer
Data stream processing is an important function in many online applications such as
network traffic analysis, web applications, and financial data analysis. Computing …

Availability by design: a complementary approach to denial-of-service

R Vigo - 2015 - orbit.dtu.dk
In computer security, a Denial-of-Service (DoS) attack aims at making a resource
unavailable. DoS attacks to systems of public concern occur increasingly and have become …

Computing discounted multidimensional hierarchical aggregates using modified misra gries algorithm

Z Shah, AN Mahmood, M Barlow - Performance Evaluation, 2015 - Elsevier
Finding the “Top k” list or heavy hitters is an important function in many computing
applications, including database joins, data warehousing (eg, OLAP), web caching and hits …

Using network resources to mitigate volumetric DDoS

PE Fabre - 2018 - theses.hal.science
Massive Denial of Service attacks represent a genuine threat for Internet service, but also
significantly impact network service providers and even threat the Internet stability. There is …

Availability by Design

R Vigo, F Nielson, HR Nielson - 19th Nordic Conference on Secure IT …, 2014 - Springer
Availability is “the property of being accessible and usable upon demand by an authorised
entity”[1], and its absence is termed Denial-of-Service (DoS) or unavailability. DoS typically …

[PDF][PDF] Utiliser les ressources réseaux pour atténuer les attaques DDoS volumétriques

PE FABRE - theses.hal.science
Résumé Les attaques massives par déni de service représentent une menace pour les
services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la …

[PDF][PDF] Network Visibility-aware Blacklist Generation

PE Fabre, J Viinikka, H Debar… - ICIMP 2018: 13th …, 2018 - personales.upv.es
Volumetric Distributed Denial of Service (DDoS) attacks have become a major concern for
network operators, as they endanger the network stability by causing severe congestion …