Taxonomy of distributed denial of service mitigation approaches for cloud computing

A Shameli-Sendi, M Pourzandi, M Fekih-Ahmed… - Journal of Network and …, 2015 - Elsevier
Cloud computing has a central role to play in meeting today׳ s business requirements.
However, Distributed Denial-of-Service (DDoS) attacks can threaten the availability of cloud …

Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants

A Kuzmanovic, EW Knightly - Proceedings of the 2003 conference on …, 2003 - dl.acm.org
Denial of Service attacks are presenting an increasing threat to the global inter-networking
infrastructure. While TCP's congestion control algorithm is highly robust to diverse network …

Controlling high bandwidth aggregates in the network

R Mahajan, SM Bellovin, S Floyd, J Ioannidis… - ACM SIGCOMM …, 2002 - dl.acm.org
The current Internet infrastructure has very few built-in protection mechanisms, and is
therefore vulnerable to attacks and failures. In particular, recent events have illustrated the …

Frequency estimation of internet packet streams with limited space

ED Demaine, A López-Ortiz, JI Munro - European Symposium on …, 2002 - Springer
We consider a router on the Internet analyzing the statistical properties of a TCP/IP packet
stream. A fundamental difficulty with measuring trafic behavior on the Internet is that there is …

Fairness-driven queue management: A survey and taxonomy

G Abbas, Z Halim, ZH Abbas - IEEE Communications Surveys & …, 2015 - ieeexplore.ieee.org
Providing congestion control in the Internet, while ensuring fairness among a myriad of
heterogeneous flows, is a challenging task. The conventional wisdom is to rely on end-user …

Approximating fair queueing on reconfigurable switches

NK Sharma, M Liu, K Atreya… - 15th USENIX Symposium …, 2018 - usenix.org
Congestion control today is predominantly achieved via end-to-end mechanisms with little
support from the network. As a result, end-hosts must cooperate to achieve optimal …

On the characteristics and origins of internet flow rates

Y Zhang, L Breslau, V Paxson, S Shenker - Proceedings of the 2002 …, 2002 - dl.acm.org
This paper considers the distribution of the rates at which flows transmit data, and the
causes of these rates. First, using packet level traces from several Internet links, and …

[KNJIGA][B] Network congestion control: managing internet traffic

M Welzl - 2005 - books.google.com
As the Internet becomes increasingly heterogeneous, the issue of congestion control
becomes ever more important. In order to maintain good network performance, mechanisms …

Passive estimation of TCP round-trip times

H Jiang, C Dovrolis - ACM SIGCOMM Computer Communication Review, 2002 - dl.acm.org
We propose and evaluate a passive measurement methodology that estimates the
distribution of Round-Trip Times (RTTs) for the TCP connections that flow through a network …

Collaborative detection and filtering of shrew DDoS attacks using spectral analysis

Y Chen, K Hwang - Journal of Parallel and Distributed Computing, 2006 - Elsevier
This paper presents a new spectral template-matching approach to countering shrew
distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing …