Trends in validation of DDoS research

S Behal, K Kumar - Procedia Computer Science, 2016 - Elsevier
Over the last decade, attackers are compromising victim systems to launch large-scale
coordinated Distributed Denial of Service (DDoS) attacks against corporate websites …

How to test dos defenses

J Mirkovic, S Fahmy, P Reiher… - … & technology conference …, 2009 - ieeexplore.ieee.org
DoS defense evaluation methods influence how well test results predict performance in real
deployment. This paper surveys existing approaches and criticizes their simplicity and the …

Towards a bayesian network game framework for evaluating ddos attacks and defense

G Yan, R Lee, A Kent, D Wolpert - … of the 2012 ACM conference on …, 2012 - dl.acm.org
With a long history of compromising Internet security, Distributed Denial-of-Service (DDoS)
attacks have been intensively investigated and numerous countermeasures have been …

Accurately measuring denial of service in simulation and testbed experiments

J Mirkovic, A Hussain, S Fahmy… - … on Dependable and …, 2008 - ieeexplore.ieee.org
Researchers in the denial-of-service (DoS) field lack accurate, quantitative, and versatile
metrics to measure service denial in simulation and testbed experiments. Without such …

Hands-on denial of service lab exercises using slowloris and rudy

E Damon, J Dale, E Laron, J Mache, N Land… - proceedings of the 2012 …, 2012 - dl.acm.org
This paper presents an interactive exercise based on offensive denial of service techniques
used by hackers. The goals of the exercise are to teach how a large class of denial of …

FLAME: A Flow-Level Anomaly Modeling Engine.

D Brauckhoff, A Wagner, M May - CSET, 2008 - usenix.org
There are several remaining open questions in the area of flow-based anomaly detection,
eg, how to do meaningful evaluations of anomaly detection mechanisms; how to get …

Seer: A security experimentation environment for deter

S Schwab, B Wilson, C Ko, A Hussain - Proceedings of the DETER …, 2007 - dl.acm.org
Configuring a security experiment can be tedious, involving many low level and repetitive
configuration tasks. In order to make DETER's capabilites accessible to users at all skill …

Use of ip addresses for high rate flooding attack detection

E Ahmed, G Mohay, A Tickle, S Bhatia - … and Privacy–Silver Linings in the …, 2010 - Springer
High-rate flooding attacks (aka Distributed Denial of Service or DDoS attacks) continue to
constitute a pernicious threat within the Internet domain. In this work we demonstrate how …

Bayesian game based pseudo honeypot model in social networks

M Du, Y Li, Q Lu, K Wang - … , ICCCS 2017, Nanjing, China, June 16-18 …, 2017 - Springer
In this paper, we study applying honeypots to protect social networks against DDoS attacks.
Different from previous works that study honeypots for DDoS attacks, we consider attackers …

[PDF][PDF] Detection, classification and visualization of anomalies using generalized entropy metrics

BM Tellenbach - 2012 - research-collection.ethz.ch
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited
supply of information and services. Statistics such as the six-fold increase of US online retail …