AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks

S Ali, SC Tan, CK Lee, Z Yusoff, MR Haque, A Mylonas… - Sensors, 2023 - mdpi.com
… , the logical links in AALLA model are used to provide connectivity and restore the availability
of resources when DDoS attacks happen. The AALLA model considers a link assignment …

ConnectionScore: a statistical technique to resist application-layer DDoS attacks

H Beitollahi, G Deconinck - Journal of Ambient Intelligence and …, 2014 - Springer
… This paper proposes a novel scheme which is called ConnectionScore to resist such DDoS
attacks. During the attack time, any connection is scored based on history and statistical …

A recent survey on DDoS attacks and defense mechanisms

A Srivastava, BB Gupta, A Tyagi, A Sharma… - … Conference on Parallel …, 2011 - Springer
… of DDoS attacks, DDoS attack history and incidents, DDoS attack strategy, DDoS attack tools,
… In Logical or software attack, a small number of malformed packets are designed to exploit …

[PDF][PDF] DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey

KM Prasad, ARM Reddy, KV Rao - Global Journal of Computer Science …, 2014 - core.ac.uk
… on the internet, many DDoS attack Detection, Prevention and … different types of attacks and
techniques of DDoS attacks and their … Detection of DDoS flooding attack using fuzzy logic. …

[图书][B] Theoretical and experimental methods for defending against DDoS attacks

IS Amiri, MRK Soltanian - 2015 - books.google.com
… A single zombie network performs a DDoS attack Taxonomy of DoS and DDoS A sample
overlay network Logical layers of overlay network A DDoS attack in progress General client …

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris, A Mitrokotsa - Computer networks, 2004 - Elsevier
… Extremely sophisticated, “user-friendly” and powerful DDoS toolkits are available to … in a
DoS or a DDoS attack. DDoS attacking programs have very simple logic structures and small …

DDoS attack mitigation in Internet of Things using software defined networking

ME Ahmed, H Kim - … IEEE third international conference on big …, 2017 - ieeexplore.ieee.org
… a unique opportunity to effectively detect and mitigate DDoS attacks. By leveraging SDNs
features such as software-based traffic analysis, logical centralized control, dynamic flow in…

[HTML][HTML] DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges

LF Eliyan, R Di Pietro - Future Generation Computer Systems, 2021 - Elsevier
… that address both DoS and DDoS attacks in SDNs through the lenses … research directions
to address DoS/DDoS attacks in SDNs. … Mainly, it takes advantage of the logically centralized …

Offloading real-time DDoS attack detection to programmable data planes

ÂC Lapolli, JA Marques… - 2019 IFIP/IEEE …, 2019 - ieeexplore.ieee.org
… to implement sophisticated security logic on forwarding devices … The results show that it
can detect DDoS attacks entirely … in SRAM per 1 Gbps link and a few hundred TCAM entries). …

Analyzing the Benefits of Optical Topology Programming for Mitigating Link-Flood DDoS Attacks

M Nance-Hall, Z Liu, V Sekar… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
… This formulation is agnostic to any packet-processing logic or mitigation methods and can …
Gbps of attack traffic in only one instance, where a link to a leaf node was flooded (this link is …