Detection techniques of DDoS attacks: A survey

P Kamboj, MC Trivedi, VK Yadav… - 2017 4th IEEE Uttar …, 2017 - ieeexplore.ieee.org
Security is the main confront of internet, Distributed Denial of Service (DDoS) is the major
cause of threat. DDoS reduces the network resources, and results in bandwidth depletion …

Complex attack linkage decision-making in edge computing networks

Q Li, S Meng, S Zhang, J Hou, L Qi - IEEE access, 2019 - ieeexplore.ieee.org
The edge computing network refers to a new paradigm of edge-side big data computing
networks, which integrates networks, computing, storage, and business core capabilities. It …

The time for reconstructing the attack graph in DDoS attacks

D Barak-Pelleg, D Berend - Journal of Mathematical Analysis and …, 2024 - Elsevier
Despite their frequency, denial-of-service (DoS 5) and distributed-denial-of-service (DDoS)
attacks are difficult to prevent and trace, thus posing a constant threat. One of the main …

Algorithms for reconstructing DDoS attack graphs using probabilistic packet marking

D Barak-Pelleg, D Berend, TJ Robinson… - arXiv preprint arXiv …, 2023 - arxiv.org
DoS and DDoS attacks are widely used and pose a constant threat. Here we explore
Probability Packet Marking (PPM), one of the important methods for reconstructing the attack …

[PDF][PDF] Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition.

S Saurabh, AS Sairam - Int. J. Netw. Secur., 2016 - Citeseer
Abstract Probabilistic Packet Marking (PPM) is one of the most promising schemes for
performing IP Traceback. PPM reconstructs the attack graph in order to trace back to the …

Simulating a coupon collector

D Barak-Pelleg, D Berend - … on Cyber Security, Cryptology, and Machine …, 2022 - Springer
The coupon collector's problem (CCP) reads as follows: How many drawings are needed on
average in order to complete a collection of n types of coupons, if at each step a single …

Apin: Automatic attack path identification in computer networks

E Ficke, S Xu - … on Intelligence and Security Informatics (ISI), 2020 - ieeexplore.ieee.org
Identifying the scope of a network attack can be difficult with limited information about the
nature of the attack. Even more difficult is the automation of this process. Because of this, it is …

[PDF][PDF] Implementing flash event discrimination in IP traceback using shark smell optimisation algorithm

OW Salami, IJ Umoh… - Kinetik: Game …, 2019 - download.garuda.kemdikbud.go.id
Denial of service attack and its variants are the largest ravaging network problems. They are
used to cause damage to network by disrupting its services in order to harm a business or …

Coloring networks for attacker identification and response

AS Sairam, S Roy, R Sahay - Security and Communication …, 2015 - Wiley Online Library
Network‐based attacks such as denial‐of‐service attacks are usually performed by spoofing
the source IP address. Packet marking techniques are used to trace such attackers as close …

Fast Simulations of the Multi-Album Collector

D Barak-Pelleg, D Berend - 2024 - researchsquare.com
Our starting point is the coupon collector's problem. In this problem, there are $ n $ coupons
that are drawn uniformly randomly with replacement. The question is how many drawings on …