Survey of network-based defense mechanisms countering the DoS and DDoS problems
T Peng, C Leckie, K Ramamohanarao - ACM Computing Surveys (CSUR …, 2007 - dl.acm.org
This article presents a survey of denial of service attacks and the methods that have been
proposed for defense against these attacks. In this survey, we analyze the design decisions …
proposed for defense against these attacks. In this survey, we analyze the design decisions …
DoS and DDoS in named data networking
With the growing realization that current Internet protocols are reaching the limits of their
senescence, several on-going research efforts aim to design potential next-generation …
senescence, several on-going research efforts aim to design potential next-generation …
Interest flooding attack and countermeasures in named data networking
A Afanasyev, P Mahadevan… - 2013 IFIP …, 2013 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are an ongoing problem in today's Internet,
where packets from a large number of compromised hosts thwart the paths to the victim site …
where packets from a large number of compromised hosts thwart the paths to the victim site …
DDoS attacks and defense mechanisms: classification and state-of-the-art
C Douligeris, A Mitrokotsa - Computer networks, 2004 - Elsevier
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest
security problems in today's Internet. Of particular concern are Distributed Denial of Service …
security problems in today's Internet. Of particular concern are Distributed Denial of Service …
Poseidon: Mitigating interest flooding DDoS attacks in named data networking
Content-Centric Networking (CCN) is an emerging networking paradigm being considered
as a possible replacement for the current IP-based host-centric Internet infrastructure. CCN …
as a possible replacement for the current IP-based host-centric Internet infrastructure. CCN …
Distributed denial of service attacks: a threat or challenge
J Kaur Chahal, A Bhandari, S Behal - New Review of Information …, 2019 - Taylor & Francis
In today's cyber world, the Internet has become a vital resource for providing a plethora of
services. Unavailability of these services due to any reason leads to huge financial …
services. Unavailability of these services due to any reason leads to huge financial …
Distributed denial of service prevention techniques
BB Gupta, RC Joshi, M Misra - arXiv preprint arXiv:1208.3557, 2012 - arxiv.org
The significance of the DDoS problem and the increased occurrence, sophistication and
strength of attacks has led to the dawn of numerous prevention mechanisms. Each proposed …
strength of attacks has led to the dawn of numerous prevention mechanisms. Each proposed …
[PDF][PDF] Bentuk Serangan DoS (Denial of Service) dan DDoS (Distributed Deial of Service) pada Jaringan NDN (Named Data Network)
MND Satria, IB Rahardjo - Acad.(Accelerating world's Res., vol. 5241, 2016 - academia.edu
Perkembangan teknologi jaringan yang semakin hari semakin meningkat saat ini membuat
protokol internet yang mencapai batas ambangnya membuat beberapa upaya penelitian …
protokol internet yang mencapai batas ambangnya membuat beberapa upaya penelitian …
A detection and offense mechanism to defend against application layer DDoS attacks
Application layer DDoS attacks, which are legitimate in packets and protocols, gradually
become a pressing problem for commerce, politics and military. We build an attack model …
become a pressing problem for commerce, politics and military. We build an attack model …
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …
it a destructive weapon of attackers which can disrupt the services of any network including …