Jaqen: A {High-Performance}{Switch-Native} approach for detecting and mitigating volumetric {DDoS} attacks with programmable switches

Z Liu, H Namkung, G Nikolaidis, J Lee, C Kim… - 30th USENIX Security …, 2021 - usenix.org
The emergence of programmable switches offers a new opportunity to revisit ISP-scale
defenses for volumetric DDoS attacks. In theory, these can offer better cost vs. performance …

[HTML][HTML] HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

OrchSec: An orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions

A Zaalouk, R Khondoker, R Marx… - 2014 IEEE Network …, 2014 - ieeexplore.ieee.org
The original design of the Internet did not take network security aspects into consideration,
instead it aimed to facilitate the process of information exchange between end-hosts …

Bringing intelligence to software defined networks: Mitigating DDoS attacks

Z Abou El Houda, L Khoukhi… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As one of the most devastating types of Distributed Denial of Service (DDoS) attacks,
Domain Name System (DNS) amplification attack represents a big threat and one of the …

TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS

GCM Moura, S Castro, J Heidemann… - Proceedings of the 21st …, 2021 - dl.acm.org
TheInternet's Domain Name System (DNS) is a part of every web request and e-mail
exchange, so DNS failures can be catastrophic, taking out major websites and services. This …

Amplification and DRDoS attack defense--a survey and new perspectives

FJ Ryba, M Orlinski, M Wählisch, C Rossow… - arXiv preprint arXiv …, 2015 - arxiv.org
The severity of amplification attacks has grown in recent years. Since 2013 there have been
at least two attacks which involved over 300Gbps of attack traffic. This paper offers an …

[HTML][HTML] BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web

KM Prasad, ARM Reddy, KV Rao - … of King Saud University-Computer and …, 2020 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) Attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

Chainsecure-a scalable and proactive solution for protecting blockchain applications using sdn

Z Abou El Houda, L Khoukhi… - 2018 IEEE global …, 2018 - ieeexplore.ieee.org
Nowadays, blockchain is seen as one of the main technological innovations. Many
applications can rely on the blockchain to secure their exchanges. However, applications …

Detecting amplification attacks with software defined networking

CC Chen, YR Chen, WC Lu, SC Tsai… - 2017 IEEE conference …, 2017 - ieeexplore.ieee.org
Distributed denial of service (DDoS) is an attack that attempts to disrupt network service for
various malicious purposes. It makes use of public services as reflectors to amplify the traffic …

[PDF][PDF] Anomaly Behavior Analysis of DNS Protocol.

P Satam, HR Alipour, YB Al-Nashif, S Hariri - J. Internet Serv. Inf. Secur., 2015 - isyou.info
DNS protocol is critically important for secure network operations. All networked applications
request DNS protocol to translate the network domain names to correct IP addresses. The …