A comprehensive survey on DDoS defense systems: New trends and challenges

Q Li, H Huang, R Li, J Lv, Z Yuan, L Ma, Y Han… - Computer Networks, 2023 - Elsevier
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …

A taxonomy of bio-inspired cyber security approaches: existing techniques and future directions

U Rauf - Arabian Journal for Science and Engineering, 2018 - Springer
After decades of deploying cyber security systems, it is a well-known fact that the existing
cyber infrastructure has numerous inherent limitations that make the maintenance of the …

Scale inside-out: Rapid mitigation of cloud DDoS attacks

G Somani, MS Gaur, D Sanghi, M Conti… - … on Dependable and …, 2017 - ieeexplore.ieee.org
The distributed denial of service (DDoS) attacks in cloud computing requires quick
absorption of attack data. DDoS attack mitigation is usually achieved by dynamically scaling …

A moving target defense approach to mitigate DDoS attacks against proxy-based architectures

S Venkatesan, M Albanese, K Amin… - … IEEE conference on …, 2016 - ieeexplore.ieee.org
Distributed Denial of Service attacks against high-profile targets have become more frequent
in recent years. In response to such massive attacks, several architectures have adopted …

Moving target defense against DDoS attacks: An empirical game-theoretic analysis

M Wright, S Venkatesan, M Albanese… - Proceedings of the 2016 …, 2016 - dl.acm.org
Distributed denial-of-service attacks are an increasing problem facing web applications, for
which many defense techniques have been proposed, including several moving-target …

Revealing Protocol Architecture's Design Patterns in the Volumetric DDoS Defense Design Space

Z Zhang, G **ao, S Song, RC Aygun… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks have plagued the Internet for decades. Despite
the ever-increasing investments into mitigation solution development, DDoS attacks …

Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems

M Moore, TK Kuppusamy, J Cappos - Proceedings of the 39th Annual …, 2023 - dl.acm.org
Modern software installation tools often use packages from more than one repository,
presenting a unique set of security challenges. Such a configuration increases the risk of …

Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review

P Verma, N Bharot, JG Breslin… - Transactions on …, 2024 - Wiley Online Library
Cloud computing (CC) offers on‐demand computing and resources to users, and
organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud …

Moving Target Defense‐Based Denial‐of‐Service Mitigation in Cloud Environments: A Survey

M Nguyen, S Debroy - Security and Communication Networks, 2022 - Wiley Online Library
With the increased frequency and intensity of denial‐of‐service (DoS) attacks on critical
cloud‐hosted services, resource adaptation schemes adopted by the cloud service …

A review of moving target defense mechanisms for internet of things applications

N Saputro, S Tonyali, A Aydeger… - … and Design of …, 2020 - Wiley Online Library
The chapter presents a review of proactive Moving Target Defense (MTD) paradigm and
investigates the feasibility and potential of specific MTD approaches for the resource …