Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and …

Q Yan, FR Yu, Q Gong, J Li - IEEE communications surveys & …, 2015 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks in cloud computing environments are growing
due to the essential characteristics of cloud computing. With recent advances in software …

[HTML][HTML] Packet analysis for network forensics: A comprehensive survey

LF Sikos - Forensic Science International: Digital Investigation, 2020 - Elsevier
Packet analysis is a primary traceback technique in network forensics, which, providing that
the packet details captured are sufficiently detailed, can play back even the entire network …

PINT: Probabilistic in-band network telemetry

R Ben Basat, S Ramanathan, Y Li, G Antichi… - Proceedings of the …, 2020 - dl.acm.org
Commodity network devices support adding in-band telemetry measurements into data
packets, enabling a wide range of applications, including network troubleshooting …

Flowguard: An intelligent edge defense mechanism against IoT DDoS attacks

Y Jia, F Zhong, A Alrawais, B Gong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are getting more and more popular in recent years and IoT
networks play an important role in the industry as well as people's activities. On the one …

A taxonomy of DDoS attack and DDoS defense mechanisms

J Mirkovic, P Reiher - ACM SIGCOMM Computer Communication …, 2004 - dl.acm.org
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety
of both the attacks and the defense approaches is overwhelming. This paper presents two …

Network applications of bloom filters: A survey

A Broder, M Mitzenmacher - Internet mathematics, 2004 - Taylor & Francis
A Bloom filter is a simple space-efficient randomized data structure for representing a set in
order to support membership queries. Bloom filters allow false positives but the space …

I know what your packet did last hop: Using packet histories to troubleshoot networks

N Handigol, B Heller, V Jeyakumar… - … USENIX Symposium on …, 2014 - usenix.org
The complexity of networks has outpaced our tools to debug them; today, administrators use
manual tools to diagnose problems. In this paper, we show how packet histories—the full …

Measuring ISP topologies with Rocketfuel

N Spring, R Mahajan, D Wetherall - ACM SIGCOMM Computer …, 2002 - dl.acm.org
To date, realistic ISP topologies have not been accessible to the research community,
leaving work that depends on topology on an uncertain footing. In this paper, we present …

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris, A Mitrokotsa - Computer networks, 2004 - Elsevier
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest
security problems in today's Internet. Of particular concern are Distributed Denial of Service …

Survey of network-based defense mechanisms countering the DoS and DDoS problems

T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …