Statistical Techniques for Mitigation and Prevention of Distributed Attacks over Communication Networks

M Tambasco - 2021 - elea.unisa.it
The thesis is focused on statistical methods to characterize, mitigate, and counteract
distributed network attacks. When coping with distributed network attacks such as …

Cyber security risk assessment of a ddos attack

G Wangen, A Shalaginov, C Hallstensen - … , HI, USA, September 3-6, 2016 …, 2016 - Springer
This paper proposes a risk assessment process based on distinct classes and estimators,
which we apply to a case study of a common communications security risk; a distributed …

[PDF][PDF] A Tool for Visualization and Analysis of Distributed Denial-of-Service (DDoS) Attacks

L Boillat, J von der Assen, M Franco… - … Group, Department of …, 2020 - files.ifi.uzh.ch
Abstract Da DDoS Attacken in den letzten Jahren umfassender und heftiger wurden, wird
der Bedarf nach Analysen immer notwendiger, um einerseits Entwicklungen in …

[PDF][PDF] A statistical approach to flow-based network attack detection

S Abt - Bachelor's, 2009 - Citeseer
Since many years, network attacks are a well-established, but still growing threat in the
internet landscape. In times, however, where telecommunication providers work on …

Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA).

WJ Blackert, DM Gregg, AK Castner, RL Hom… - DISCEX (2), 2003 - apps.dtic.mil
The project uses modeling and simulation to analyze performance of mitigation technologies
to combat Distributed Denial of Service Attacks. The system also determines how an attacker …

Benchmarks for Evaluation of Distributed Denial of Service (DDOS)

J Mirkovic, DELAWARE UNIV NEWARK - 2008 - apps.dtic.mil
The main goal of our work was to develop the benchmark suite for evaluation of defenses
against distributed denial-of-service DDoS attacks. The desired features of the benchmark …

Overview of Distributed Denial of Service (DDoS) attack types and mitigation methods

M Merkebaiuly - Scientific Collection «InterConf+», 2024 - archive.interconf.center
In the evolving landscape of cyber threats, Distributed Denial of Service (DDoS) attacks
pose a significant challenge to internet security. This research provides a comprehensive …

Defense and monitoring model for distributed denial of service attacks

U Tariq, Y Malik, B Abdulrazak - Procedia Computer Science, 2012 - Elsevier
Due to emergence of wireless networks and immense use of hand held devices, wireless
networks encounter a great threat of denial of service attack. Traditionally IP-Based Filtering …

On the effectiveness of DDoS attacks on statistical filtering

Q Li, EC Chang, MC Chan - Proceedings IEEE 24th Annual …, 2005 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks pose a serious threat to service availability of
the victim network by severely degrading its performance. Recently, there has been …

[PDF][PDF] Detecting the onset of a network layer dos attack with a graph-based approach

R Paudel, P Harlan, W Eberle - The thirty-second international flairs …, 2019 - cdn.aaai.org
A denial-of-service (DoS) attack is a malicious act with the goal of interrupting the access to
a computer network. The result of DoS attack can cause the computers on the network to …