A taxonomy of botnet behavior, detection, and defense

S Khattak, NR Ramay, KR Khan… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
A number of detection and defense mechanisms have emerged in the last decade to tackle
the botnet phenomenon. It is important to organize this knowledge to better understand the …

Network forensics: Review, taxonomy, and open challenges

S Khan, A Gani, AWA Wahab, M Shiraz… - Journal of Network and …, 2016 - Elsevier
In recent years, a number of network forensics techniques have been proposed to
investigate the increasing number of cybercrimes. Network forensics techniques assist in …

Flowguard: An intelligent edge defense mechanism against IoT DDoS attacks

Y Jia, F Zhong, A Alrawais, B Gong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are getting more and more popular in recent years and IoT
networks play an important role in the industry as well as people's activities. On the one …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

Industrial control system network intrusion detection by telemetry analysis

S Ponomarev, T Atkison - IEEE Transactions on Dependable …, 2015 - ieeexplore.ieee.org
Until recently, industrial control systems (ICSs) used “air-gap” security measures, where
every node of the ICS network was isolated from other networks, including the Internet, by a …

Traceback of DDoS attacks using entropy variations

S Yu, W Zhou, R Doss, W Jia - IEEE transactions on parallel …, 2010 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the
memoryless feature of the Internet routing mechanisms makes it extremely hard to trace …

Flexible deterministic packet marking: An IP traceback system to find the real source of attacks

Y Xiang, W Zhou, M Guo - IEEE Transactions on Parallel and …, 2008 - ieeexplore.ieee.org
IP traceback is the enabling technology to control Internet crime. In this paper we present a
novel and practical IP traceback system called Flexible Deterministic Packet Marking …

Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems

PAR Kumar, S Selvakumar - Computer Communications, 2013 - Elsevier
A DDoS attack is the most prevalent threat, viz., flooding the computing and communication
resources in order to make the service unavailable for legitimate users, since a decade and …

[HTML][HTML] Hadoop based defense solution to handle distributed denial of service (ddos) attacks

S Tripathi, B Gupta, A Almomani, A Mishra, S Veluru - 2013 - scirp.org
Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations
worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the …

Passive IP traceback: Disclosing the locations of IP spoofers from path backscatter

G Yao, J Bi, AV Vasilakos - IEEE Transactions on Information …, 2014 - ieeexplore.ieee.org
It is long known attackers may use forged source IP address to conceal their real locations.
To capture the spoofers, a number of IP traceback mechanisms have been proposed …