Survey of network-based defense mechanisms countering the DoS and DDoS problems

T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …

Anomaly detection in streams with extreme value theory

A Siffer, PA Fouque, A Termier, C Largouet - Proceedings of the 23rd …, 2017 - dl.acm.org
Anomaly detection in time series has attracted considerable attention due to its importance
in many real-world applications including intrusion detection, energy management and …

Jaqen: A {High-Performance}{Switch-Native} approach for detecting and mitigating volumetric {DDoS} attacks with programmable switches

Z Liu, H Namkung, G Nikolaidis, J Lee, C Kim… - 30th USENIX Security …, 2021 - usenix.org
The emergence of programmable switches offers a new opportunity to revisit ISP-scale
defenses for volumetric DDoS attacks. In theory, these can offer better cost vs. performance …

A review on statistical approaches for anomaly detection in DDoS attacks

M Nooribakhsh, M Mollamotalebi - Information Security Journal: A …, 2020 - Taylor & Francis
ABSTRACT Distributed Denial-of-Service (DDoS) attack is one of the most common and
effective type of attacks aiming to deny or weaken the service providing of its victim (s). The …

[HTML][HTML] Denial-of-service attack on IEC 61850-based substation automation system: A crucial cyber threat towards smart substation pathways

S Ashraf, MH Shawon, HM Khalid, SM Muyeen - Sensors, 2021 - mdpi.com
The generation of the mix-based expansion of modern power grids has urged the utilization
of digital infrastructures. The introduction of Substation Automation Systems (SAS) …

DoS and DDoS in named data networking

P Gasti, G Tsudik, E Uzun… - 2013 22nd International …, 2013 - ieeexplore.ieee.org
With the growing realization that current Internet protocols are reaching the limits of their
senescence, several on-going research efforts aim to design potential next-generation …

Interest flooding attack and countermeasures in named data networking

A Afanasyev, P Mahadevan… - 2013 IFIP …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet,
where packets from a large number of compromised hosts thwart the paths to the victim site …

Poseidon: Mitigating interest flooding DDoS attacks in named data networking

A Compagno, M Conti, P Gasti… - 38th annual IEEE …, 2013 - ieeexplore.ieee.org
Content-Centric Networking (CCN) is an emerging networking paradigm being considered
as a possible replacement for the current IP-based host-centric Internet infrastructure. CCN …

Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior

Z Hu, R Odarchenko, S Gnatyuk… - International …, 2020 - search.proquest.com
Represented paper is currently topical, because of year on year increasing quantity and
diversity of attacks on computer networks that causes significant losses for companies. This …

Anomaly detection in IP networks

M Thottan, C Ji - IEEE Transactions on signal processing, 2003 - ieeexplore.ieee.org
Network anomaly detection is a vibrant research area. Researchers have approached this
problem using various techniques such as artificial intelligence, machine learning, and state …