A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development

A Verma, R Saha, N Kumar, G Kumar - Multimedia Tools and Applications, 2022 - Springer
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …

A survey of distributed denial of service attack

KN Mallikarjunan, K Muthupriya… - 2016 10th International …, 2016 - ieeexplore.ieee.org
Information security deals with a large number of subjects like spoofed message detection,
audio processing, video surveillance and cyber-attack detections. However the biggest …

[HTML][HTML] Network forensic investigation protocol to identify true origin of cyber crime

RY Patil, SR Devane - Journal of King Saud University-Computer and …, 2022 - Elsevier
An increase in digitization is giving rise to cybercrimes. The existing network protocols are
insufficient for collecting the required digital evidence of cybercrime, which eventually makes …

[HTML][HTML] Trace malicious source to guarantee cyber security for mass monitor critical infrastructure

X Liu, M Dong, K Ota, LT Yang, A Liu - Journal of Computer and System …, 2018 - Elsevier
The proposed traceback scheme does not take into account the trust of node which leads to
the low effectiveness. A trust-aware probability marking (TAPM) traceback scheme is …

Unmasking of source identity, a step beyond in cyber forensic

RY Patil, SR Devane - Proceedings of the 10th international conference …, 2017 - dl.acm.org
Increasing number of digital crime raises the need of investigation where the most critical
step is to collect the evidences of attack and find the real origin of the attack. However the …

HPSIPT: A high-precision single-packet IP traceback scheme

V Murugesan, MS Selvaraj, MH Yang - Computer Networks, 2018 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack remains a major threat, even in the era
of connected devices. Attackers often hide their identity, making defending or identifying and …

[PDF][PDF] Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition.

S Saurabh, AS Sairam - Int. J. Netw. Secur., 2016 - Citeseer
Abstract Probabilistic Packet Marking (PPM) is one of the most promising schemes for
performing IP Traceback. PPM reconstructs the attack graph in order to trace back to the …

Hybrid approach for IP traceback analysis in wireless networks

V Praveena, S Karthik, G Jeon - Wireless Personal Communications, 2020 - Springer
Absrtact Distributed Denial-Of-Service (DDoS) attacks are one of the all the more difficult
security issues on the Internet today. They can without much of a stretch, fumes the assets of …

A comprehensive analysis for fair probability marking based traceback approach in WSNs

A Liu, X Liu, Y Liu - Security and Communication Networks, 2016 - Wiley Online Library
Currently, the analysis result of fair probability marking approach can only be got in the
single‐source linear and single‐source tree network, which cannot meet the requirement of …