Analyzing well-known countermeasures against distributed denial of service attacks

H Beitollahi, G Deconinck - Computer Communications, 2012 - Elsevier
This paper reviews and analyzes well-known countermeasures against distributed denial of
service (DDoS) attacks. This paper provides an in-depth analysis of each countermeasure …

An adversary-centric behavior modeling of DDoS attacks

A Wang, A Mohaisen, S Chen - 2017 IEEE 37th International …, 2017 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are some of the most persistent threats on the
Internet today. The evolution of DDoS attacks calls for an in-depth analysis of those attacks …

[PDF][PDF] Анализ актуальных типов DDoS-атак и методов защиты от них

ЯА Бекенева - Известия Санкт-Петербургского государственного …, 2016 - izv.eltech.ru
DDoS-атака–распределенная атака типа «отказ в обслуживании» различных интернет-
сервисов. При успешном совершении подобных атак на сервер он перестает отвечать …

An sdn-based approach for defending against reflective ddos attacks

T Lukaseder, K Stölzle, S Kleber… - 2018 IEEE 43rd …, 2018 - ieeexplore.ieee.org
Distributed Reflective Denial of Service (DRDoS) attacks are an immanent threat to Internet
services. The potential scale of such attacks became apparent in March 2018 when a …

ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters

S Saurabh, AS Sairam - Computer Communications, 2014 - Elsevier
Most of the schemes that mitigate DRDoS attack only provide mechanism for filtering the
attack traffic. They do not provide any tool for tracing back to the attacker. The few schemes …

Shield: DoS filtering using traffic deflecting

E Kline, A Afanasyev, P Reiher - 2011 19th IEEE International …, 2011 - ieeexplore.ieee.org
Denial-of-service (DoS) attacks continue to be a major problem on the Internet. While many
defense mechanisms have been created, they all have significant deployment issues. This …

Resect: Self-learning traffic filters for ip spoofing defense

J Mirkovic, E Kline, P Reiher - Proceedings of the 33rd Annual Computer …, 2017 - dl.acm.org
IP spoofing has been a persistent Internet security threat for decades. While research
solutions exist that can help an edge network detect spoofed and reflected traffic, the sheer …

FR-WARD: Fast retransmit as a wary but ample response to distributed denial-of-service attacks from the Internet of Things

S Mergendahl, D Sisodia, J Li… - 2018 27th International …, 2018 - ieeexplore.ieee.org
While the Internet of Things (IoT) becomes increasingly popular and ubiquitous, IoT devices
often remain unprotected and can be exploited to launch large-scale distributed denial-of …

sShield: small DDoS defense system using RIP-based traffic deflection in autonomous system

HS Kang, SR Kim - The Journal of Supercomputing, 2014 - Springer
DDoS (distributed denial of service) attacks have gradually increased and have become
more sophisticated. There have been several methods for defending against these attacks …

[PDF][PDF] Security in high-bandwidth networks

T Lukaseder - 2020 - oparu.uni-ulm.de
Ever-increasing bandwidth in networks presents a challenge to security mechanisms as the
amount of traffic following Gilder's law) increases faster than the computational power …