Low-rate DDoS attacks detection and traceback by using new information metrics
A low-rate distributed denial of service (DDoS) attack has significant ability of concealing its
traffic because it is very much like normal traffic. It has the capacity to elude the current …
traffic because it is very much like normal traffic. It has the capacity to elude the current …
Vampire attacks: Draining life from wireless ad hoc sensor networks
EY Vasserman, N Hopper - IEEE transactions on mobile …, 2011 - ieeexplore.ieee.org
Ad hoc low-power wireless networks are an exciting research direction in sensing and
pervasive computing. Prior security work in this area has focused primarily on denial of …
pervasive computing. Prior security work in this area has focused primarily on denial of …
Performance and features: Mitigating the low-rate TCP-targeted DoS attack via SDN
D Tang, Y Yan, S Zhang, J Chen… - IEEE Journal on Selected …, 2021 - ieeexplore.ieee.org
Software-Defined Networking (SDN) is an emerging network architecture. The decoupled
data and control plane provides programmability for efficient network management …
data and control plane provides programmability for efficient network management …
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew
distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing …
distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing …
The {CrossPath} attack: Disrupting the {SDN} control channel via shared links
Software-Defined Networking (SDN) enables network innovations with a centralized
controller controlling the whole network through the control channel. Because the control …
controller controlling the whole network through the control channel. Because the control …
A low-rate DDoS detection and mitigation for SDN using Renyi Entropy with Packet Drop
Abstract Software-Defined Networking (SDN) is an approach to network architecture that
enables software applications used for intelligent, centralized network management or …
enables software applications used for intelligent, centralized network management or …
Detection and mitigation of low-rate denial-of-service attacks: A survey
The potential for being the target of Denial of Service (DoS) attacks is one of the most severe
security threats on the Internet. Attackers have been modifying their attack format over the …
security threats on the Internet. Attackers have been modifying their attack format over the …
[HTML][HTML] Flow level detection and filtering of low-rate DDoS
The recently proposed TCP-targeted Low-rate Distributed Denial-of-Service (LDDoS)
attacks send fewer packets to attack legitimate flows by exploiting the vulnerability in TCP's …
attacks send fewer packets to attack legitimate flows by exploiting the vulnerability in TCP's …
Low‐rate DDoS attack detection using expectation of packet size
L Zhou, M Liao, C Yuan, H Zhang - Security and …, 2017 - Wiley Online Library
Low‐rate Distributed Denial‐of‐Service (low‐rate DDoS) attacks are a new challenge to
cyberspace, as the attackers send a large amount of attack packets similar to normal traffic …
cyberspace, as the attackers send a large amount of attack packets similar to normal traffic …
Stealthy denial of service strategy in cloud computing
M Ficco, M Rak - IEEE transactions on cloud computing, 2014 - ieeexplore.ieee.org
The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-
by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks …
by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks …