A comprehensive survey on DDoS defense systems: New trends and challenges
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions
U Rauf - Arabian Journal for Science and Engineering, 2018 - Springer
After decades of deploying cyber security systems, it is a well-known fact that the existing
cyber infrastructure has numerous inherent limitations that make the maintenance of the …
cyber infrastructure has numerous inherent limitations that make the maintenance of the …
Scale inside-out: Rapid mitigation of cloud DDoS attacks
The distributed denial of service (DDoS) attacks in cloud computing requires quick
absorption of attack data. DDoS attack mitigation is usually achieved by dynamically scaling …
absorption of attack data. DDoS attack mitigation is usually achieved by dynamically scaling …
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
Distributed Denial of Service attacks against high-profile targets have become more frequent
in recent years. In response to such massive attacks, several architectures have adopted …
in recent years. In response to such massive attacks, several architectures have adopted …
Moving target defense against DDoS attacks: An empirical game-theoretic analysis
Distributed denial-of-service attacks are an increasing problem facing web applications, for
which many defense techniques have been proposed, including several moving-target …
which many defense techniques have been proposed, including several moving-target …
Revealing Protocol Architecture's Design Patterns in the Volumetric DDoS Defense Design Space
Distributed Denial of Service (DDoS) attacks have plagued the Internet for decades. Despite
the ever-increasing investments into mitigation solution development, DDoS attacks …
the ever-increasing investments into mitigation solution development, DDoS attacks …
Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems
Modern software installation tools often use packages from more than one repository,
presenting a unique set of security challenges. Such a configuration increases the risk of …
presenting a unique set of security challenges. Such a configuration increases the risk of …
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review
Cloud computing (CC) offers on‐demand computing and resources to users, and
organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud …
organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud …
Moving Target Defense‐Based Denial‐of‐Service Mitigation in Cloud Environments: A Survey
With the increased frequency and intensity of denial‐of‐service (DoS) attacks on critical
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …
A review of moving target defense mechanisms for internet of things applications
The chapter presents a review of proactive Moving Target Defense (MTD) paradigm and
investigates the feasibility and potential of specific MTD approaches for the resource …
investigates the feasibility and potential of specific MTD approaches for the resource …