[PDF][PDF] Distributed reflection denial of service attack: A critical review

RR Nuiaa, S Manickam… - International Journal of …, 2021 - researchgate.net
As the world becomes increasingly connected and the number of users grows exponentially
and “things” go online, the prospect of cyberspace becoming a significant target for …

Weaponizing middleboxes for {TCP} reflected amplification

K Bock, A Alaraj, Y Fax, K Hurley, E Wustrow… - 30th USENIX Security …, 2021 - usenix.org
Reflective amplification attacks are a powerful tool in the arsenal of a DDoS attacker, but to
date have almost exclusively targeted UDP-based protocols. In this paper, we demonstrate …

A novel SIP based distributed reflection denial-of-service attack and an effective defense mechanism

IM Tas, BG Unsalver, S Baktir - IEEE access, 2020 - ieeexplore.ieee.org
We introduce a novel SIP based attack, named as the SR-DRDoS attack, that exploits some
less known SIP features by using the IP-spoofing technique, the reflection based attack logic …

A novel approach for efficient mitigation against the SIP-based DRDoS attack

IM Tas, S Baktir - Applied Sciences, 2023 - mdpi.com
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are
widely deployed technologies since they provide an efficient and fast means of both voice …

Investigation of the impact of DDoS attack on network efficiency of the University of Zakho

SM Sulaiman, SK Askar - Science Journal of University of Zakho, 2015 - sjuoz.uoz.edu.krd
In this paper an investigation was conducted to have an insight into the impact of the DDoS
attack on the network efficiency of the University of Zakho, in particular, after deploying a …

Enhancing IPFS privacy through triple hashing

T Katsantas, Y Thomas, C Karapapas… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
The InterPlanetary File System (IPFS) is a popular distributed storage system, with
worldwide presence. Due to the open nature and distributed routing of IPFS, malicious users …

A review of ADDoS attack mechanisms, amplification vulnerability discovery, and mitigation

S Jiang, H Chen, Z Jia, Z Wang… - … Conference on Signal …, 2025 - spiedigitallibrary.org
Amplification-based distributed denial of service attacks (ADDoS) are a common and severe
threat to the Internet. Recent reports of ADDoS attacks demonstrate that such attacks not …

A review of recently emerging denial of service threats and defences in the transport layer

D Saif, A Cormier, S Banik… - 2018 IEEE Canadian …, 2018 - ieeexplore.ieee.org
Denial of Service (DoS), and their larger-scale variant Distributed DoS (DDoS), attacks seek
out and exploit various network vulnerabilities in order to overwhelm a node to the point of …

Asynchronous Messaging in a P2P System: Defending Against a Storage Exhaustion Attack on Kademlia DHT

M Biro - 2022 - repository.fit.edu
An instant messaging service designed using a peer to peer distributed network architecture
has many appealing properties it gets for free: high scalability, cheap operational cost and …

Mitigation Against Distributed-Denial of Service Attacks Using Distribution and Self-Learning Aegis System

DVR Guntamukalla - 2017 - search.proquest.com
This thesis evaluates the potential for deploying defense against distributed denial of service
(DDoS), as is a well-known cyber threat which when deployed causes great damage to a …