An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics

KS Sahoo, D Puthal, M Tiwary, JJPC Rodrigues… - Future Generation …, 2018 - Elsevier
The primary innovations behind Software Defined Networks (SDN) are the decoupling of the
control plane from the data plane and centralizing the network management through a …

Entropy based features distribution for anti-DDoS model in SDN

RMA Ujjan, Z Pervez, K Dahal, WA Khan, AM Khattak… - Sustainability, 2021 - mdpi.com
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are
considered as severe network security threats. For conventional network security tools it is …

Quick service during DDoS attacks in the container-based cloud environment

A Kumar, M Agarwal - Journal of Network and Computer Applications, 2024 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are one of the biggest internet security
risks. As DDoS attacks directly target the availability of the victim's services, defending …

IP spoofing detection using modified hop count

A Mukaddam, I Elhajj, A Kayssi… - 2014 IEEE 28th …, 2014 - ieeexplore.ieee.org
With the global widespread usage of the Internet, more and more cyber-attacks are being
performed. Many of these attacks utilize IP address spoofing. This paper describes IP …

FHSD: an improved IP spoof detection method for web DDoS attacks

SN Shiaeles, M Papadaki - The Computer Journal, 2015 - academic.oup.com
Distributed denial of service (DDoS) attacks represent a significant threat for companies,
affecting them on a regular basis, as reported in the 2013 Information Security Breaches …

Defending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique

R Maheshwari, CR Krishna… - … Conference on Issues …, 2014 - ieeexplore.ieee.org
IP spoofing based DDoS attack that relies on multiple compromised hosts in the network to
attack the victim. In IP spoofing, IP addresses can be forged easily, thus, makes it difficult to …

Impact of DDoS attack (UDP Flooding) on queuing models

SM Hussain, GR Beigh - 2013 4th International Conference on …, 2013 - ieeexplore.ieee.org
DDoS (Distributed Denial of Service) attacks pose a big threat to the availability of services
on the Internet. DDoS degrades the performance of a network; disconnects the host and …

Detection of control layer ddos attack using entropy metrics in sdn: an empirical investigation

KS Sahoo, B Sahoo, M Vankayala… - 2017 Ninth International …, 2017 - ieeexplore.ieee.org
The Software Defined Networks (SDN) and OpenFlow technologies become the emerging
networking technology that supports the dynamic nature of the network functions through …

Evaluation of mitigation methods for distributed denial of service attacks

RRR Robinson, C Thomas - 2012 7th IEEE Conference on …, 2012 - ieeexplore.ieee.org
Distributed Denial of Service attacks of today present a difficult challenge to the network
administrators as well as to the users of the Internet. Distributed Denial of Service war field …

Mitigating denial of service attacks in hierarchical wireless sensor networks

R Nanda, PV Krishna - Network security, 2011 - Elsevier
Due to the considerable research and development invested in new networking protocols,
Wireless Sensor Networks (WSNs) have proved to be an important emerging field. WSNs …