A review of amplification-based distributed denial of service attacks and their mitigation

S Ismail, HR Hassen, M Just, H Zantout - Computers & Security, 2021 - Elsevier
Abstract The rise of Distributed Denial of Service (DDoS) attacks have been steady in terms
of the frequency and the impact of the attack. Traditionally, the attackers required control of a …

A survey on human-centric communications in non-cooperative wireless relay networks

B Jedari, F Xia, Z Ning - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
The performance of data delivery in wireless relay networks (WRNs), such as delay-tolerant
networks and device-to-device communications heavily relies on the cooperation of mobile …

{AmpFuzz}: Fuzzing for amplification {DDoS} vulnerabilities

J Krupp, I Grishchenko, C Rossow - 31st USENIX Security Symposium …, 2022 - usenix.org
Amplification DDoS attacks remain a prevalent and serious threat to the Internet, with recent
attacks reaching the Tbps range. However, all amplification attack vectors known to date …

A DRDoS detection and defense method based on deep forest in the big data environment

R Xu, J Cheng, F Wang, X Tang, J Xu - Symmetry, 2019 - mdpi.com
Distributed Denial of Service (DDoS) has developed multiple variants, one of which is
Distributed Reflective Denial of Service (DRDoS). With the increasing number of Internet of …

A survey of transmission control protocol variants

LM Machora - World Journal of Advanced Research and Reviews, 2024 - wjarr.co.in
TCP (Transmission Control Protocol), is a reliable connection oriented end-to-end protocol.
It contains within itself, mechanisms for ensuring reliability by requiring the receiver to …

Content pollution propagation in the overlay network of peer‐to‐peer live streaming systems: modelling and analysis

H Wang, X Chen, W Wang, MY Chan - IET Communications, 2018 - Wiley Online Library
In the past few years, peer‐to‐peer (P2P) live streaming systems have gained great
commercial success and have become a popular way to deliver multimedia content over the …

Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet

RRH Amin, D Hassan, M Hussin - Kurdistan Journal of Applied …, 2020 - kjar.spu.edu.iq
DNS reflection/amplification attacks are types of Distributed Denial of Service (DDoS)
attacks that take advantage of vulnerabilities in the Domain Name System (DNS) and use it …

Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir

A Sari - Journal of Cyber Security Technology, 2018 - Taylor & Francis
This research details a country-wide cyber-attack and proposes a cyber-firewall called
'Seddulbahir'to defend against future attacks. The country-wide dual-phased cyber-attack …

Defense Analysis Against Store and Forward Distributed Reflective Denial of Service Attacks

M Fraiwan, F Al-Quran… - … on Innovations in …, 2018 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are a dangerous large scale highly coordinated
attempts to disable network-based computer systems. The attackers are comprised of a …

[PDF][PDF] Leveraging Machine Learning and Deep Learning Technologies for Predicting Distributed Denial of Service Attacks: A Systematic Review Analysis

JP NDAYIZIGIYE, M Mjahidi, G Gilbert - academia.edu
Technologies, especially Fourth Industrial Revolution Technologies (4thIRTs) like Big Data
Analytics (BDA), Artificial Intelligence (AI), and Cloud Computing (CC), among others, have …