A review of amplification-based distributed denial of service attacks and their mitigation

S Ismail, HR Hassen, M Just, H Zantout - Computers & Security, 2021 - Elsevier
Abstract The rise of Distributed Denial of Service (DDoS) attacks have been steady in terms
of the frequency and the impact of the attack. Traditionally, the attackers required control of a …

A survey on forensics and compliance auditing for critical infrastructure protection

J Henriques, F Caldeira, T Cruz, P Simões - IEEE Access, 2024 - ieeexplore.ieee.org
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness …

[HTML][HTML] Systematic review of graphical visual methods in honeypot attack data analysis

G Ikuomenisan, Y Morgan - Journal of Information Security, 2022 - scirp.org
Mitigating increasing cyberattack incidents may require strategies such as reinforcing
organizations' networks with Honeypots and effectively analyzing attack traffic for detection …

Task-based visual interactive modeling: Decision trees and rule-based classifiers

D Streeb, Y Metz, U Schlegel… - … on Visualization and …, 2021 - ieeexplore.ieee.org
Visual analytics enables the coupling of machine learning models and humans in a tightly
integrated workflow, addressing various analysis tasks. Each task poses distinct demands to …

ARDefense: DDoS detection and prevention using NFV and SDN

AK Singh, RK Jaiswal, K Abdukodir… - … congress on ultra …, 2020 - ieeexplore.ieee.org
Network Function Virtualization or NFV gives numerous advantages over the conventional
networking techniques by incorporating distinctive features of a network over the virtual …

Cyberattack graph modeling for visual analytics

M Rabzelj, C Bohak, LŠ Južnič, A Kos, U Sedlar - IEEE Access, 2023 - ieeexplore.ieee.org
Cybersecurity research demands continuous monitoring of the dynamic threat landscape to
detect novel attacks. Researchers and security professionals often deploy honeypot …

Visual analytics for root dns data

E Krokos, A Rowden, K Whitley… - 2018 IEEE Symposium on …, 2018 - computer.org
The analysis of vast amounts of network data for monitoring and safeguarding a core pillar of
the internet, the root DNS, is an enormous challenge. Understanding the distribution of the …

VisRuler: Visual analytics for extracting decision rules from bagged and boosted decision trees

A Chatzimparmpas, RM Martins… - Information …, 2023 - journals.sagepub.com
Bagging and boosting are two popular ensemble methods in machine learning (ML) that
produce many individual decision trees. Due to the inherent ensemble characteristic of …

Assessment of honeypots: Issues, challenges and future directions

BB Gupta, A Gupta - International Journal of Cloud Applications and …, 2018 - igi-global.com
Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is
trapped. It is a defensive technique which lures the attacker into performing some illicit …

Sorting the garbage: Filtering out DRDoS amplification traffic in ISP networks

Y Zhauniarovich, P Dodia - 2019 IEEE Conference on Network …, 2019 - ieeexplore.ieee.org
Distributed Reflected Denial of Service (DRDoS) attacks have been continuing to grow
unprecedentedly in the recent years. Attackers abuse genuine services running some …