DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications

A Praseed, PS Thilagam - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
… This paper attempts to explore the entire spectrum of application layer DDoS attacks
application layer DDoS attacks which integrates attacks exploiting the four major application layer

Monitoring the application-layer DDoS attacks for popular websites

Y Xie, SZ Yu - IEEE/ACM Transactions on networking, 2008 - ieeexplore.ieee.org
… to detect DDoS attacks from three different layers: IP layer, TCP layer, and application layer.
… from the attack one. Here, we survey representative research from each perspective. Most …

Tackling application-layer DDoS attacks

H Beitollahi, G Deconinck - Procedia Computer Science, 2012 - Elsevier
… against network-layer DDoS attacks. Two useful surveys that collect these techniques are
[1, 2]. The most promising technique against applicationlayer DDoS attacks is CAPTCHA …

Application-layer denial of service attacks: taxonomy and survey

G Mantas, N Stakhanova, H Gonzalez… - … of Information and …, 2015 - inderscienceonline.com
… This gave a boost to development of application layer DoS attacks, that became one of the
… % of all attacks in 2013 (Prolexic, 2013). The growth of application layer DoS attack incidents …

A selective defense for application layer ddos attacks

YG Dantas, V Nigam, IE Fonseca - 2014 IEEE Joint Intelligence …, 2014 - ieeexplore.ieee.org
… types of Application Layer DDoS attacks namely the Flooding and the Slowloris attacks [24]. …
This paper introduced a novel defense for Application Layer DDoS attacks (ADDoS), called …

Detection and defense of application-layer DDoS attacks in backbone web traffic

W Zhou, W Jia, S Wen, Y Xiang, W Zhou - Future Generation Computer …, 2014 - Elsevier
… Currently, there are some methods designed to handle the AL-DDoS attacks, but … AL-DDoS
attacks. Our work distinguishes itself from previous methods by considering AL-DDoS attack

A novel model for detecting application layer DDoS attacks

Y Xie, SZ Yu - … international multi-symposiums on computer and …, 2006 - ieeexplore.ieee.org
… sophisticated attacks that utilize legitimate application layer … Since the attack signature of
each application layer DDoS is … to protect the servers from these attacks. In contrast to prior …

An overview on detection and prevention of application layer DDoS attacks

S Black, Y Kim - 2022 IEEE 12th Annual Computing and …, 2022 - ieeexplore.ieee.org
Attacks can focus on functionality such as database … of application layer attacks, preventative
and detection measures, and take a closer look specifically at HTTP Flooding attacks by the …

A detection and offense mechanism to defend against application layer DDoS attacks

J Yu, Z Li, H Chen, X Chen - International Conference on …, 2007 - ieeexplore.ieee.org
… Similarly, we think the best security strategy against DDoS attacks is to defend … application
layer threat model and then propose a mechanism to defend against the layer-7 DDoS attacks

Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges

K Singh, P Singh, K Kumar - Computers & security, 2017 - Elsevier
… target of GET flooding attacks, a common practice followed among … application layer DDoS
attacks. With the presence of new and improved attack programs, identifying these attacks