A comprehensive survey on DDoS defense systems: New trends and challenges

Q Li, H Huang, R Li, J Lv, Z Yuan, L Ma, Y Han… - Computer Networks, 2023 - Elsevier
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …

Software-defined networking-based DDoS defense mechanisms

R Swami, M Dave, V Ranga - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Distributed Denial of Service attack (DDoS) is recognized to be one of the most catastrophic
attacks against various digital communication entities. Software-defined networking (SDN) is …

[PDF][PDF] Poseidon: Mitigating volumetric ddos attacks with programmable switches

M Zhang, G Li, S Wang, C Liu, A Chen, H Hu… - the 27th Network and …, 2020 - par.nsf.gov
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …

A comprehensive survey on DDoS attacks and recent defense mechanisms

BB Gupta, A Dahiya, C Upneja, A Garg… - … of Research on …, 2020 - igi-global.com
DDoS attack always takes advantage of structure of Internet and imbalance of resources
between defender and attacker. DDoS attacks are driven by factors like interdependency of …

Enabling performant, flexible and cost-efficient DDoS defense with programmable switches

G Li, M Zhang, S Wang, C Liu, M Xu… - IEEE/ACM …, 2021 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks have become a critical threat to the Internet.
Due to the increasing number of vulnerable Internet of Things (IoT) devices, attackers can …

STRIDE: sanctuary trail--refuge from internet DDoS entrapment

HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee… - Proceedings of the 8th …, 2013 - dl.acm.org
We propose STRIDE, a new DDoS-resilient Internet architecture that isolates attack traffic
through viable bandwidth allocation, preventing a botnet from crowding out legitimate flows …

DDoS attacks—analysis and prevention

G Dayanandam, TV Rao, D Bujji Babu… - Innovations in Computer …, 2019 - Springer
Abstract Distributed Denial-of-Service (DDoS) attacks overwhelm the critical resources of a
target server in order to reject its services to the legitimate clients and attack mainly on the …

A comprehensive survey of DDoS defense solutions in SDN: Taxonomy, research challenges, and future directions

S Kaur, K Kumar, N Aggarwal, G Singh - Computers & Security, 2021 - Elsevier
The recent emergence of technologies such as Network Functions Virtualization (NFV),
Intent based Networking, Internet of Things (IoT), 5G, and Cloud Computing have led to the …

DDoS attacks and machine‐learning‐based detection methods: A survey and taxonomy

M Najafimehr, S Zarifzadeh, S Mostafavi - Engineering Reports, 2023 - Wiley Online Library
Distributed denial of service (DDoS) attacks represent a significant cybersecurity challenge,
posing a critical risk to computer networks. Developing an effective defense mechanism …

Deepddos: Online ddos attack detection

Z Shi, J Li, C Wu - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
Highly efficient and dependable large-scale DDoS attack detection scheme is critical for
network anomaly detection. Typical machine learning algorithms such as Decision Tree and …