Survey of network-based defense mechanisms countering the DoS and DDoS problems
T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …
proposed for defense against these attacks. In this survey, we analyze the design decisions …
Anomaly detection in streams with extreme value theory
Anomaly detection in time series has attracted considerable attention due to its importance
in many real-world applications including intrusion detection, energy management and …
in many real-world applications including intrusion detection, energy management and …
Jaqen: A {High-Performance}{Switch-Native} approach for detecting and mitigating volumetric {DDoS} attacks with programmable switches
The emergence of programmable switches offers a new opportunity to revisit ISP-scale
defenses for volumetric DDoS attacks. In theory, these can offer better cost vs. performance …
defenses for volumetric DDoS attacks. In theory, these can offer better cost vs. performance …
A review on statistical approaches for anomaly detection in DDoS attacks
M Nooribakhsh, M Mollamotalebi - Information Security Journal: A …, 2020 - Taylor & Francis
ABSTRACT Distributed Denial-of-Service (DDoS) attack is one of the most common and
effective type of attacks aiming to deny or weaken the service providing of its victim (s). The …
effective type of attacks aiming to deny or weaken the service providing of its victim (s). The …
[HTML][HTML] Denial-of-service attack on IEC 61850-based substation automation system: A crucial cyber threat towards smart substation pathways
The generation of the mix-based expansion of modern power grids has urged the utilization
of digital infrastructures. The introduction of Substation Automation Systems (SAS) …
of digital infrastructures. The introduction of Substation Automation Systems (SAS) …
DoS and DDoS in named data networking
With the growing realization that current Internet protocols are reaching the limits of their
senescence, several on-going research efforts aim to design potential next-generation …
senescence, several on-going research efforts aim to design potential next-generation …
Interest flooding attack and countermeasures in named data networking
A Afanasyev, P Mahadevan… - 2013 IFIP …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet,
where packets from a large number of compromised hosts thwart the paths to the victim site …
where packets from a large number of compromised hosts thwart the paths to the victim site …
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
Content-Centric Networking (CCN) is an emerging networking paradigm being considered
as a possible replacement for the current IP-based host-centric Internet infrastructure. CCN …
as a possible replacement for the current IP-based host-centric Internet infrastructure. CCN …
Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior
Represented paper is currently topical, because of year on year increasing quantity and
diversity of attacks on computer networks that causes significant losses for companies. This …
diversity of attacks on computer networks that causes significant losses for companies. This …
Anomaly detection in IP networks
Network anomaly detection is a vibrant research area. Researchers have approached this
problem using various techniques such as artificial intelligence, machine learning, and state …
problem using various techniques such as artificial intelligence, machine learning, and state …