Taxonomy of distributed denial of service mitigation approaches for cloud computing
A Shameli-Sendi, M Pourzandi, M Fekih-Ahmed… - Journal of Network and …, 2015 - Elsevier
Cloud computing has a central role to play in meeting today׳ s business requirements.
However, Distributed Denial-of-Service (DDoS) attacks can threaten the availability of cloud …
However, Distributed Denial-of-Service (DDoS) attacks can threaten the availability of cloud …
Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants
Denial of Service attacks are presenting an increasing threat to the global inter-networking
infrastructure. While TCP's congestion control algorithm is highly robust to diverse network …
infrastructure. While TCP's congestion control algorithm is highly robust to diverse network …
Controlling high bandwidth aggregates in the network
The current Internet infrastructure has very few built-in protection mechanisms, and is
therefore vulnerable to attacks and failures. In particular, recent events have illustrated the …
therefore vulnerable to attacks and failures. In particular, recent events have illustrated the …
Frequency estimation of internet packet streams with limited space
We consider a router on the Internet analyzing the statistical properties of a TCP/IP packet
stream. A fundamental difficulty with measuring trafic behavior on the Internet is that there is …
stream. A fundamental difficulty with measuring trafic behavior on the Internet is that there is …
Fairness-driven queue management: A survey and taxonomy
Providing congestion control in the Internet, while ensuring fairness among a myriad of
heterogeneous flows, is a challenging task. The conventional wisdom is to rely on end-user …
heterogeneous flows, is a challenging task. The conventional wisdom is to rely on end-user …
Approximating fair queueing on reconfigurable switches
Congestion control today is predominantly achieved via end-to-end mechanisms with little
support from the network. As a result, end-hosts must cooperate to achieve optimal …
support from the network. As a result, end-hosts must cooperate to achieve optimal …
On the characteristics and origins of internet flow rates
This paper considers the distribution of the rates at which flows transmit data, and the
causes of these rates. First, using packet level traces from several Internet links, and …
causes of these rates. First, using packet level traces from several Internet links, and …
[KNJIGA][B] Network congestion control: managing internet traffic
M Welzl - 2005 - books.google.com
As the Internet becomes increasingly heterogeneous, the issue of congestion control
becomes ever more important. In order to maintain good network performance, mechanisms …
becomes ever more important. In order to maintain good network performance, mechanisms …
Passive estimation of TCP round-trip times
H Jiang, C Dovrolis - ACM SIGCOMM Computer Communication Review, 2002 - dl.acm.org
We propose and evaluate a passive measurement methodology that estimates the
distribution of Round-Trip Times (RTTs) for the TCP connections that flow through a network …
distribution of Round-Trip Times (RTTs) for the TCP connections that flow through a network …
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew
distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing …
distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing …