Amplification and DRDoS attack defense--a survey and new perspectives

FJ Ryba, M Orlinski, M Wählisch, C Rossow… - arXiv preprint arXiv …, 2015 - arxiv.org
The severity of amplification attacks has grown in recent years. Since 2013 there have been
at least two attacks which involved over 300Gbps of attack traffic. This paper offers an …

ONOS flood defender: An intelligent approach to mitigate DDoS attack in SDN

N Aslam, S Srivastava, MM Gore - Transactions on Emerging …, 2022 - Wiley Online Library
Abstract Software‐Defined Networking (SDN) has made its place in the networks as new
technology. SDN's programmable behavior enables it to change behavior on the fly …

CPU load analysis & minimization for TCP SYN flood detection

D Kshirsagar, S Sawant, A Rathod… - Procedia Computer …, 2016 - Elsevier
Denials of service attacks are well-known as one of the major threats in today's Internet
services. Majority VOIP services, DNS servers, online gaming and e-commerce applications …

A machine learning based approach for detecting DRDoS attacks and its performance evaluation

Y Gao, Y Feng, J Kawamoto… - 2016 11th Asia joint …, 2016 - ieeexplore.ieee.org
DRDoS (Distributed Reflection Denial of Service) attack is a kind of DoS (Denial of Service)
attack, in which third-party servers are tricked into sending large amounts of data to the …

Evaluation of mitigation methods for distributed denial of service attacks

RRR Robinson, C Thomas - 2012 7th IEEE Conference on …, 2012 - ieeexplore.ieee.org
Distributed Denial of Service attacks of today present a difficult challenge to the network
administrators as well as to the users of the Internet. Distributed Denial of Service war field …

Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E‐commerce web server

K Karoui - International Journal of Network Management, 2016 - Wiley Online Library
Network security management is a complex and costly task. This is due to the diversity and
the large number of assets to protect from potential threats. It is difficult for enterprises to …

[PDF][PDF] A Study and Detection of TCP SYN Flood Attacks with IP spoofing and its Mitigations

DS Rana, N Garg, SK Chamoli - International Journal of Computer …, 2012 - researchgate.net
Flooding attacks are major threats on TCP/IP protocol suite these days; Maximum attacks
are launched through TCP and exploit the resources and bandwidth of the machine …

The protocol independent detection and classification (PIDC) system for DRDoS attack

PM Priya, V Akilandeswari, SM Shalinie… - … on Recent Trends in …, 2014 - ieeexplore.ieee.org
High-rate flooding attack detection and classification has become a necessary component
for network administrators due to their attack range that affects the Data Center servers. The …

Signature-based ddos attack mitigation: Automated generating rules for extended berkeley packet filter and express data path

HD Wieren - 2019 - essay.utwente.nl
Distributed Denial of Service (DDoS) attacks are malicious attempts to disrupt a service from
the target by overwhelming it by network packets. DDoS attacks are continuously rising in …

Improving Network, Data and Application Security for SMEs

C Tselios, I Politis, C Xenakis - … of the 17th International Conference on …, 2022 - dl.acm.org
The evolution of Information and Communications Technology and Cloud Computing,
combined with the advent of novel telecommunication frameworks such as 5G, have …