[PDF][PDF] StopIt: Mitigating DoS flooding attacks from multi-million botnets

X Liu, X Yang, Y Lu - 2008 - Citeseer
This paper presents the design and implementation of a filter-based DoS defense system
(StopIt) and a comparison study on the effectiveness of filters and capabilities. Central to the …

To filter or to authorize: Network-layer DoS defense against multimillion-node botnets

X Liu, X Yang, Y Lu - Proceedings of the ACM SIGCOMM 2008 …, 2008 - dl.acm.org
This paper presents the design and implementation of a filter-based DoS defense system
(StopIt) and a comparison study on the effectiveness of filters and capabilities. Central to the …

Anticipating moves to prevent botnet generated ddos flooding attacks

M Nogueira - arXiv preprint arXiv:1611.09983, 2016 - arxiv.org
Volumetric Distributed Denial of Service (DDoS) attacks have been a recurrent issue on the
Internet. These attacks generate a flooding of fake network traffic to interfere with targeted …

[PDF][PDF] Phalanx: Withstanding Multimillion-Node Botnets.

C Dixon, TE Anderson, A Krishnamurthy - NSDI, 2008 - usenix.org
Large-scale distributed denial of service (DoS) attacks are an unfortunate everyday reality
on the Internet. They are simple to execute and with the growing prevalence and size of …

Delving into internet DDoS attacks by botnets: characterization and analysis

A Wang, W Chang, S Chen… - IEEE/ACM Transactions …, 2018 - ieeexplore.ieee.org
Internet distributed denial of service (DDoS) attacks are prevalent but hard to defend
against, partially due to the volatility of the attacking methods and patterns used by attackers …

On the feasibility of rerouting-based DDoS defenses

M Tran, MS Kang, HC Hsiao… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Large botnet-based flooding attacks have recently demonstrated unprecedented damage.
However, the best-known end-to-end availability guarantees against flooding attacks require …

Discrete-event simulation of botnet protection mechanisms

I Kotenko, A Konovalov, A Shorov… - Discrete Event …, 2012 - books.google.com
The common use of computers, connected to the Internet, as well as insufficient level of
security, allow malefactors to execute large-scale infrastructure attacks, engaging in criminal …

Mitigating iot botnet ddos attacks through mud and ebpf based traffic filtering

A Feraudo, DA Popescu, P Yadav, R Mortier… - Proceedings of the 25th …, 2024 - dl.acm.org
As the prevalence of Internet-of-Things (IoT) devices becomes more and more dominant, so
too do the associated management and security challenges. One such challenge is the …

A data-driven study of DDoS attacks and their dynamics

A Wang, W Chang, S Chen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Despite continuous defense efforts, DDoS attacks are still very prevalent on the Internet. In
such arms races, attackers are becoming more agile and their strategies are more …

POSTER: How Distributed Are Today's DDoS Attacks?

A Wang, W Chang, A Mohaisen, S Chen - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Today botnets are responsible for most of the DDoS attacks on the Internet. Understanding
the characteristics of such DDoS attacks is critical to develop effective DDoS mitigation …