A comprehensive survey on DDoS defense systems: New trends and challenges
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …
Machine learning approaches for combating distributed denial of service attacks in modern networking environments
A Aljuhani - IEEE Access, 2021 - ieeexplore.ieee.org
A distributed denial of service (DDoS) attack represents a major threat to service providers.
More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by …
More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
A collaborative DDoS defence framework using network function virtualization
High-profile and often destructive distributed denial of service (DDoS) attacks continue to be
one of the top security concerns as the DDoS attacks volumes are increasing constantly …
one of the top security concerns as the DDoS attacks volumes are increasing constantly …
A survey of network function virtualization security
Network Function Virtualization (NFV) provides many benefits to consumers because it is a
cost-efficient evolution of legacy networks, allowing the enhancement and extension of …
cost-efficient evolution of legacy networks, allowing the enhancement and extension of …
Holistic DDoS mitigation using NFV
Distributed Denial of Service (DDoS) is a sophisticated cyber-attack due to its variety of
types and techniques. The traditional mitigation method of this attack is to deploy dedicated …
types and techniques. The traditional mitigation method of this attack is to deploy dedicated …
Cost-efficient virtual network function graph (vNFG) provisioning in multidomain elastic optical networks
Y Wang, P Lu, W Lu, Z Zhu - Journal of Lightwave Technology, 2017 - opg.optica.org
Acting as a promising technology to bring revolutionary changes to how the networks are
architected, network function virtualization (NFV) leverages IT virtualization technologies to …
architected, network function virtualization (NFV) leverages IT virtualization technologies to …
Mitigation Techniques for Cyber Attacks: A Systematic Mapping Study
K Ishaq, S Fareed - arXiv preprint arXiv:2308.13587, 2023 - arxiv.org
In the wake of the arrival of digital media, the Internet, the web, and online social media, a
flood of new cyber security research questions have emerged. There is a lot of money being …
flood of new cyber security research questions have emerged. There is a lot of money being …
An inter-domain collaboration scheme to remedy DDoS attacks in computer networks
Distributed denial-of-service (DDoS) attacks continue to trouble network operators and
service providers, and with increasing intensity. Effective response to DDoS can be slow …
service providers, and with increasing intensity. Effective response to DDoS can be slow …
Load distributed and benign-bot mitigation methods for IoT DNS flood attacks
A domain name system (DNS) is one of the most important infrastructures of the Internet
communication. It is also a crucial point which is subjected to attacks. The largest distributed …
communication. It is also a crucial point which is subjected to attacks. The largest distributed …