Security data collection and data analytics in the internet: A survey

X Jing, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

A reversible sketch-based method for detecting and mitigating amplification attacks

X Jing, J Zhao, Q Zheng, Z Yan, W Pedrycz - Journal of Network and …, 2019 - Elsevier
Amplification attacks bring serious threats to network security due to their characteristics of
anonymity and amplification. How to detect amplification attacks attracts more and more …

FAPM: A Fake Amplification Phenomenon Monitor to Filter DRDoS Attacks With P4 Data Plane

D Tang, X Wang, K Li, C Yin, W Liang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Distributed Reflection Denial-of-Service (DRDoS) attacks have caused significant
destructive effects by virtue of emerging protocol vulnerabilities and amplification …

Elimination of dos UDP reflection amplification bandwidth attacks, protecting TCP services

TG Booth, K Andersson - Future Network Systems and Security: First …, 2015 - Springer
In this paper, we propose a solution to eliminate a popular type of Denial of Service (DoS)
attack, which is a DoS amplification attack. Note that a DoS is a subset of DDoS. Our solution …

[PDF][PDF] STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme

JS Jo, J Kwak - Journal of The Korea Institute of Information …, 2019 - koreascience.kr
Cloud networks are used to provide various services. As services are increasingly deployed
using cloud networks, there are a number of resources in the cloud that leverage a variety of …