Flooding DDoS mitigation and traffic management with software defined networking
Mitigating distributed denial-of-service attacks can be a complex task due to the wide range
of attack types, attacker adaptation, and defender constraints. We propose a defense …
of attack types, attacker adaptation, and defender constraints. We propose a defense …
Anomaly-based intrusion detection by modeling probability distributions of flow characteristics
B Atli - 2017 - aaltodoc.aalto.fi
In recent years, with the increased use of network communication, the risk of compromising
the information has grown immensely. Intrusions have evolved and become more …
the information has grown immensely. Intrusions have evolved and become more …
Network intrusion detection using flow statistics
The increasing use of network data within every aspect of human life, ranging from genetic
databases to credit card payments, urges for efficient methods for detecting any attempts …
databases to credit card payments, urges for efficient methods for detecting any attempts …
Computing hierarchical summary of the data streams
Data stream processing is an important function in many online applications such as
network traffic analysis, web applications, and financial data analysis. Computing …
network traffic analysis, web applications, and financial data analysis. Computing …
Availability by design: a complementary approach to denial-of-service
R Vigo - 2015 - orbit.dtu.dk
In computer security, a Denial-of-Service (DoS) attack aims at making a resource
unavailable. DoS attacks to systems of public concern occur increasingly and have become …
unavailable. DoS attacks to systems of public concern occur increasingly and have become …
Computing discounted multidimensional hierarchical aggregates using modified misra gries algorithm
Finding the “Top k” list or heavy hitters is an important function in many computing
applications, including database joins, data warehousing (eg, OLAP), web caching and hits …
applications, including database joins, data warehousing (eg, OLAP), web caching and hits …
Using network resources to mitigate volumetric DDoS
PE Fabre - 2018 - theses.hal.science
Massive Denial of Service attacks represent a genuine threat for Internet service, but also
significantly impact network service providers and even threat the Internet stability. There is …
significantly impact network service providers and even threat the Internet stability. There is …
Availability by Design
Availability is “the property of being accessible and usable upon demand by an authorised
entity”[1], and its absence is termed Denial-of-Service (DoS) or unavailability. DoS typically …
entity”[1], and its absence is termed Denial-of-Service (DoS) or unavailability. DoS typically …
[PDF][PDF] Utiliser les ressources réseaux pour atténuer les attaques DDoS volumétriques
PE FABRE - theses.hal.science
Résumé Les attaques massives par déni de service représentent une menace pour les
services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la …
services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la …
[PDF][PDF] Network Visibility-aware Blacklist Generation
PE Fabre, J Viinikka, H Debar… - ICIMP 2018: 13th …, 2018 - personales.upv.es
Volumetric Distributed Denial of Service (DDoS) attacks have become a major concern for
network operators, as they endanger the network stability by causing severe congestion …
network operators, as they endanger the network stability by causing severe congestion …