A review of amplification-based distributed denial of service attacks and their mitigation

S Ismail, HR Hassen, M Just, H Zantout - Computers & Security, 2021 - Elsevier
Abstract The rise of Distributed Denial of Service (DDoS) attacks have been steady in terms
of the frequency and the impact of the attack. Traditionally, the attackers required control of a …

A novel approach for efficient mitigation against the SIP-based DRDoS attack

IM Tas, S Baktir - Applied Sciences, 2023 - mdpi.com
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are
widely deployed technologies since they provide an efficient and fast means of both voice …

An efficient algorithm to detect DDoS amplification attacks

MA Quadir, J Christy Jackson… - Journal of Intelligent …, 2020 - content.iospress.com
Abstract Domain name system (DNS) plays a critical part in the functioning of the Internet.
But since DNS queries are sent using UDP, it is vulnerable to Distributed Denial of Service …

Comparing the performance of intrusion detection systems: Snort and Suricata

BR Murphy - 2019 - search.proquest.com
The frequency and cost of cyber breaches continue to rise. Most breaches occur within
minutes (Verizon, 2018) and remain undetected for months, with an average cost of $3.86 …

EC-NTD: Efficient countermeasure against DrDoS attacks with NAPT and two-stage detection in SDN-based networks

YC Wang, CY Wu - Computer Networks, 2024 - Elsevier
Distributed reflection denial of service (DrDoS) attacks are a prevalent and troublesome form
of DDoS attack. Fake service requests trigger a flood of services responses, typically in large …

A Prevalent Model-based on Machine Learning for Identifying DRDoS Attacks through Features Optimization Technique

P Shaha, MSI Khan, A Rahman, MM Hossain… - Statistics, Optimization …, 2024 - iapress.org
Growing apprehension among internet users regarding cyber-security threats, particularly
Distributed Reflective Denial of Service (DRDoS) attacks, underscores a pressing issue …

[PDF][PDF] A Prevalent Model-based on Machine Learning for Identifying DRDoS Attacks through Features Optimization Technique

MSIK Pabon Shaha, A Rahman, MM Hossain… - 2024 - researchgate.net
Growing apprehension among internet users regarding cyber-security threats, particularly
Distributed Reflective Denial of Service (DRDoS) attacks, underscores a pressing issue …

[PDF][PDF] Implementação e Demonstração de Ataques Cibernéticos em Sistemas SCADA

CEJF Figueiredo, MF Pedrosa, IE Fonseca - sbrt.org.br
Inserido no contexto de segurança de redes em sistemas ciber-físicos, o presente artigo
investiga vulnerabilidades nas comunicações entre dispositivos em um sistema SCADA e …

Discovery and Quantification of Open DNS Resolvers on IPv6

TAJ Klein Nijenhuis - 2018 - essay.utwente.nl
Open DNS resolvers pose a significant threat to the global network infrastructure by
answering recursive queries for hosts outside of their domains. They are commonly (mis) …

[引用][C] 基於NAPT 與自適應閾值於SDN 網路中有效抵禦DrDoS 攻擊

吳澂諺