Aggregate-based congestion control for pulse-wave DDoS defense

AG Alcoz, M Strohmeier, V Lenders… - Proceedings of the ACM …, 2022 - dl.acm.org
Pulse-wave DDoS attacks are a new type of volumetric attack formed by short, high-rate
traffic pulses. Such attacks target the Achilles' heel of state-of-the-art DDoS defenses: their …

Quick service during DDoS attacks in the container-based cloud environment

A Kumar, M Agarwal - Journal of Network and Computer Applications, 2024 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are one of the biggest internet security
risks. As DDoS attacks directly target the availability of the victim's services, defending …

[PDF][PDF] A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

P Sharma, N Sharma, R Singh - International Journal of Computer …, 2012 - academia.edu
Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great
strength to be applied in critical situations like battlefields and commercial applications such …

Ddos attack and defense scheme in wireless ad hoc networks

SA Arunmozhi, Y Venkataramani - arXiv preprint arXiv:1106.1287, 2011 - arxiv.org
The wireless ad hoc networks are highly vulnerable to distributed denial of service (DDoS)
attacks because of its unique characteristics such as open network architecture, shared …

FastDetict: A data mining engine for predecting and preventing DDoS attacks

M Nijim, H Albataineh, M Khan… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
One imperative mission of the Department of Homeland Security (DHS) is to prevent,
combat, and mitigate extensive and sophisticated Distributed Denial of Service (DDoS) …

Architecture-based exception handling

V Issarny, JP Benatre - Proceedings of the 34th Annual Hawaii …, 2001 - ieeexplore.ieee.org
Architecture-based development environments are becoming an effective solution towards
the construction of robust distributed systems. Through the abstract description of complex …

HADEGA: A novel MPLS-based mitigation solution to handle network attacks

N Hachem, H Debar… - 2012 IEEE 31st …, 2012 - ieeexplore.ieee.org
We present HADEGA, a novel adaptive mitigation solution to handle the impact of network
attacks. By extracting information from network detection alerts, and build upon the …

A flow monitoring scheme to defend reduction-of-quality (RoQ) attacks in mobile ad-hoc networks

SA Arunmozhi, Y Venkataramani - Information Security Journal: A …, 2010 - Taylor & Francis
ABSTRACT Reduction-of-Quality (RoQ) attack is a type of Distributed Denial-of-Service
(DDoS) attack that is difficult to detect in current computing systems and networks. These …

Modelling and simulation of a defense strategy to face indirect DDoS flooding attacks

A Furfaro, P Pace, A Parise, LM Valdiviezo - Internet and Distributed …, 2014 - Springer
Abstract Distributed Denial of Service (DDoS) flooding attack is one of the most diffused and
effective threat against services and applications running over the Internet. Its distributed …

Detection method based on reverse proxy against web flooding attacks

CH Lin, JC Liu, CC Lien - 2008 Eighth International Conference …, 2008 - ieeexplore.ieee.org
Web servers face all kinds of users; some of them engage malicious activities to degrade or
completely block network services, such as flooding attacks. As a result, lots of resource and …