Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions

A Bhardwaj, V Mangat, R Vig, S Halder… - Computer Science Review, 2021 - Elsevier
Cloud computing model provides on demand, elastic and fully managed computer system
resources and services to organizations. However, attacks on cloud components can cause …

ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review

M Tayyab, B Belaton, M Anbar - IEEE Access, 2020 - ieeexplore.ieee.org
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …

[PDF][PDF] An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment

J Cheng, R Xu, X Tang, VS Sheng… - Computers, materials & …, 2018 - cdn.techscience.cn
Distributed denial-of-service (DDoS) is a rapidly growing problem with the fast development
of the Internet. There are multitude DDoS detection approaches, however, three major …

SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks

NV Patil, CR Krishna, K Kumar - Cluster Computing, 2022 - Springer
Distributed denial of service (DDoS) is an immense threat for Internet based-applications
and their resources. It immediately floods the victim system by transmitting a large number of …

Detecting network cyber-attacks using an integrated statistical approach

B Bouyeddou, F Harrou, B Kadri, Y Sun - Cluster Computing, 2021 - Springer
Anomaly detection in the Internet of Things (IoT) is imperative to improve its reliability and
safety. Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the critical …

IPv6 neighbor discovery protocol specifications, threats and countermeasures: a survey

ASAMS Ahmed, R Hassan, NE Othman - IEEE access, 2017 - ieeexplore.ieee.org
Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6)
suite. The motive behind NDP is to replace address resolution protocol (ARP), router …

[HTML][HTML] DDOS-attacks detection using an efficient measurement-based statistical mechanism

B Bouyeddou, B Kadri, F Harrou, Y Sun - Engineering Science and …, 2020 - Elsevier
A monitoring mechanism is vital for detecting malicious attacks against cyber systems.
Detecting denial of service (DOS) and distributed DOS (DDOS) is one of the most important …

KS-DDoS: Kafka streams-based classification approach for DDoS attacks

NV Patil, CR Krishna, K Kumar - The Journal of Supercomputing, 2022 - Springer
A distributed denial of service (DDoS) attack is the most destructive threat for internet-based
systems and their resources. It stops the execution of victims by transferring large numbers …

[PDF][PDF] Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm.

AHB Aighuraibawi, S Manickam, R Abdullah… - Comput. Syst. Sci …, 2023 - researchgate.net
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4× 1038 unique
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …

Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network

AK Al-Ani, M Anbar, A Al-Ani, DR Ibrahim - IEEE Access, 2020 - ieeexplore.ieee.org
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most
important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from …