A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks

ST Zargar, J Joshi, D Tipper - IEEE communications surveys & …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …

A survey of security attacks in information-centric networking

EG AbdAllah, HS Hassanein… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Information-centric networking (ICN) is a new communication paradigm that focuses on
content retrieval from a network regardless of the storage location or physical representation …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y **ao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

Named data networking

L Zhang, A Afanasyev, J Burke, V Jacobson… - ACM SIGCOMM …, 2014 - dl.acm.org
Named Data Networking (NDN) is one of five projects funded by the US National Science
Foundation under its Future Internet Architecture Program. NDN has its roots in an earlier …

Bohatei: Flexible and elastic {DDoS} defense

SK Fayaz, Y Tobioka, V Sekar, M Bailey - 24th USENIX security …, 2015 - usenix.org
DDoS defense today relies on expensive and proprietary hardware appliances deployed at
fixed locations. This introduces key limitations with respect to flexibility (eg, complex routing …

Credit-scheduled delay-bounded congestion control for datacenters

I Cho, K Jang, D Han - Proceedings of the Conference of the ACM …, 2017 - dl.acm.org
Small RTTs (~ tens of microseconds), bursty flow arrivals, and a large number of concurrent
flows (thousands) in datacenters bring fundamental challenges to congestion control as they …

A data-oriented (and beyond) network architecture

T Koponen, M Chawla, BG Chun… - Proceedings of the …, 2007 - dl.acm.org
The Internet has evolved greatly from its original incarnation. For instance, the vast majority
of current Internet usage is data retrieval and service access, whereas the architecture was …

Interest flooding attack and countermeasures in named data networking

A Afanasyev, P Mahadevan… - 2013 IFIP …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet,
where packets from a large number of compromised hosts thwart the paths to the victim site …

FairCloud: Sharing the network in cloud computing

L Popa, G Kumar, M Chowdhury… - Proceedings of the …, 2012 - dl.acm.org
The network, similar to CPU and memory, is a critical and shared resource in the cloud.
However, unlike other resources, it is neither shared proportionally to payment, nor do cloud …

The crossfire attack

MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …