A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks

ST Zargar, J Joshi, D Tipper - IEEE communications surveys & …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for
security professionals. DDoS flooding attacks are typically explicit attempts to disrupt …

Network attacks: Taxonomy, tools and systems

N Hoque, MH Bhuyan, RC Baishya… - Journal of Network and …, 2014 - Elsevier
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …

Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: issues, challenges, and future research directions

A Singh, BB Gupta - International Journal on Semantic Web and …, 2022 - igi-global.com
The demand for Internet security has escalated in the last two decades because the rapid
proliferation in the number of Internet users has presented attackers with new detrimental …

A game-theoretical approach for mitigating edge DDoS attack

Q He, C Wang, G Cui, B Li, R Zhou… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Edge computing (EC) is an emerging paradigm that extends cloud computing by pushing
computing resources onto edge servers that are attached to base stations or access points …

Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm

Y Gu, K Li, Z Guo, Y Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attack is an attempt to make an online service
unavailable by overwhelming it with traffic from multiple sources. Therefore, it is necessary to …

Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling

HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani - Computer Networks, 2017 - Elsevier
A recent escalation of application layer Denial of Service (DoS) attacks on the Internet has
quickly shifted the interest of the research community traditionally focused on network-based …

Detecting malicious network software agents

B Burns, K Narayanaswamy - US Patent 8,914,878, 2014 - Google Patents
6,219,706 B1 4/2001 Fan et al. 6,321,338 B1 1 1/2001 Porras et al. 6,970,943 B1 1 1/2005
Subramanian et al. 6,975,628 B2 12/2005 Johnson et al. 7,162,740 B2 1/2007 Eastlake, III …

[HTML][HTML] HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

A survey and taxonomy of DoS attacks in cloud computing

M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …

Detection and defense of application-layer DDoS attacks in backbone web traffic

W Zhou, W Jia, S Wen, Y Xiang, W Zhou - Future Generation Computer …, 2014 - Elsevier
Web servers are usually located in a well-organized data center where these servers
connect with the outside Internet directly through backbones. Meanwhile, the application …