A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y **ao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

Booters—An analysis of DDoS-as-a-service attacks

JJ Santanna, R van Rijswijk-Deij… - 2015 IFIP/IEEE …, 2015 - ieeexplore.ieee.org
In 2012, the Dutch National Research and Education Network, SURFnet, observed a
multitude of Distributed Denial of Service (DDoS) attacks against educational institutions …

An untold story of middleboxes in cellular networks

Z Wang, Z Qian, Q Xu, Z Mao, M Zhang - ACM SIGCOMM Computer …, 2011 - dl.acm.org
The use of cellular data networks is increasingly popular as network coverage becomes
more ubiquitous and many diverse user-contributed mobile applications become available …

Exit from Hell? Reducing the Impact of {Amplification}{DDoS} Attacks

M Kührer, T Hupperich, C Rossow, T Holz - 23rd USENIX security …, 2014 - usenix.org
Amplification vulnerabilities in many UDP-based network protocols have been abused by
miscreants to launch Distributed Denial-of-Service (DDoS) attacks that exceed hundreds of …

Anycast vs. DDoS: Evaluating the November 2015 root DNS event

GCM Moura, RO Schmidt, J Heidemann… - Proceedings of the …, 2016 - dl.acm.org
Distributed Denial-of-Service (DDoS) attacks continue to be a major threat on the Internet
today. DDoS attacks overwhelm target services with requests or other traffic, causing …

Source address validation solution with OpenFlow/NOX architecture

G Yao, J Bi, P **ao - 2011 19Th IEEE international conference …, 2011 - ieeexplore.ieee.org
Current Internet is lack of validation on source IP address, resulting in many security threats.
The future Internet can face the similar routing locator spoofing problem without careful …

[PDF][PDF] Reverse traceroute.

E Katz-Bassett, HV Madhyastha, VK Adhikari, C Scott… - NSDI, 2010 - usenix.org
Traceroute is the most widely used Internet diagnostic tool today. Network operators use it to
help identify routing failures, poor performance, and router misconfigurations. Researchers …

Load adjustment in adaptive real-time systems

TW Kuo, AK Mok - Proceedings Twelfth Real-Time Systems …, 1991 - computer.org
IP spoofing, which is prevalently used for anonymity and reflection attacks, has shown
increasing destructive power in recent years. Although certain source address validation …

Off-path hacking: The illusion of challenge-response authentication

Y Gilad, A Herzberg, H Shulman - IEEE Security & Privacy, 2013 - ieeexplore.ieee.org
Everyone is concerned about Internet security, yet most traffic isn't cryptographically
protected. The typical justification is that most attackers are off path and can't intercept traffic; …

DDoS never dies? An IXP perspective on DDoS amplification attacks

D Kopp, C Dietzel, O Hohlfeld - … Conference on Passive and Active Network …, 2021 - Springer
DDoS attacks remain a major security threat to the continuous operation of Internet edge
infrastructures, web services, and cloud platforms. While a large body of research focuses …