Application layer denial-of-service attacks and defense mechanisms: a survey
N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
A survey and taxonomy of DoS attacks in cloud computing
M Masdari, M Jalali - Security and Communication Networks, 2016 - Wiley Online Library
Abstract Denial‐of‐service (DoS) attacks are one of the major security challenges in the
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …
emerging cloud computing models. Currently, numerous types of DoS attacks are conducted …
Detection and defense of application-layer DDoS attacks in backbone web traffic
Web servers are usually located in a well-organized data center where these servers
connect with the outside Internet directly through backbones. Meanwhile, the application …
connect with the outside Internet directly through backbones. Meanwhile, the application …
Analyzing well-known countermeasures against distributed denial of service attacks
H Beitollahi, G Deconinck - Computer Communications, 2012 - Elsevier
This paper reviews and analyzes well-known countermeasures against distributed denial of
service (DDoS) attacks. This paper provides an in-depth analysis of each countermeasure …
service (DDoS) attacks. This paper provides an in-depth analysis of each countermeasure …
[图书][B] DDoS attacks: evolution, detection, prevention, reaction, and tolerance
DK Bhattacharyya, JK Kalita - 2016 - books.google.com
This book discusses the evolution of distributed denial-of-service (DDoS) attacks, how to
detect a DDoS attack when one is mounted, how to prevent such attacks from taking place …
detect a DDoS attack when one is mounted, how to prevent such attacks from taking place …
Slow rate denial of service attacks against HTTP/2 and detection
N Tripathi, N Hubballi - Computers & security, 2018 - Elsevier
HTTP/2 is a newly standardized protocol designed to efficiently utilize the TCP's
transmission rate and has other advantages compared to HTTP/1.1. However its threat …
transmission rate and has other advantages compared to HTTP/1.1. However its threat …
Entropy-based application layer DDoS attack detection using artificial neural networks
K Johnson Singh, K Thongam, T De - Entropy, 2016 - mdpi.com
Distributed denial-of-service (DDoS) attack is one of the major threats to the web server. The
rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in …
rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in …
Characterizing DDoS attacks and flash events: Review, research gaps and future directions
Abstract A Distributed Denial of Service (DDoS) attack is an austere menace to network
security. Nowadays in a technological era, DDoS attacks pose a severe threat to widely …
security. Nowadays in a technological era, DDoS attacks pose a severe threat to widely …
How secure are web servers? An empirical study of slow HTTP DoS attacks and detection
Slow HTTP Denial of Service (DoS) is an application layer DoS attack in which large number
of incomplete HTTP requests are sent. If number of such open connections in the server …
of incomplete HTTP requests are sent. If number of such open connections in the server …
IoT security framework for smart water system
J Pacheco, D Ibarra, A Vijay… - 2017 IEEE/ACS 14th …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) will connect not only computers and mobile devices, but it will
also interconnect smart buildings, homes, and cities. The IoT take advantage of the latest …
also interconnect smart buildings, homes, and cities. The IoT take advantage of the latest …