Distributed Denial of Service (DDoS) detection by traffic pattern analysis
Peer-to-Peer Networking and Applications, 2012In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Service (DDoS) attack traffic from legitimated traffic regardless to various types of the attack packets and methods. Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission rates and packet forms to beat ...
Theerasak Thapngam +3 more
openaire +1 more source
RateGuard: A Robust Distributed Denial of Service (DDoS) Defense System
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, 2009One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In this paper, we focus on three kinds of sophisticated DDoS attacks that seriously cripple the current DDoS defense systems and have not been solved yet. In Fast Adaptive Attacks (FAAs), attackers adaptively generate attacking traffic based on the feedback ...
Huizhong Sun +2 more
openaire +1 more source
Distributed Denial of Service (DDoS) Protection
2021Distributed Denial-of-Service (DDoS) attacks have gone up expo-nentially over the last five years. CISOs must ensure all internet-facing high-risk (digital) applications, their cloud environments, their VOIP infrastructure, and other digital properties are adequate-ly protected against these attacks by using dynamic traffic scrub-bing and filtering ...
openaire +1 more source
Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud
2021As computing paradigm shift towards cloud computing; a new wave of distributed-denial-of-service (DDoS) has evolved to exploit cloud specific vulnerabilities to deny access to legitimate users. Cloud infrastructure employs defensive mechanism like load-balance flooding traffic; isolating data center and cloud traceback to mitigate service-oriented ...
Yichiet Aun +3 more
openaire +1 more source
Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy
2019 International Carnahan Conference on Security Technology (ICCST), 2019Distributed Denial of Service (DDoS) attack is a menace to network security that aims at exhausting the target networks with malicious traffic. Although many statistical methods have been designed for DDoS attack detection, designing a real-time detector with low computational overhead is still one of the main concerns.
Iman Sharafaldin +3 more
openaire +1 more source
Distributed denial of service defense attack tradeoff analysis (DDOS-DATA)
Proceedings DARPA Information Survivability Conference and Exposition, 2004Under sponsorship of the Defense Advanced Research Projects Agency's (DARPA) Fault Tolerant Networks (FTN) program, the Johns Hopkins University Applied Physics Laboratory (JHU/APL) has been conducting the distributed denial of service defense attack tradeoff analysis (DDOS-DATA).
W. J. Blackert +5 more
openaire +1 more source
Towards Utilizing Blockchain for Countering Distributed Denial-of-Service (DDoS)
2021Distributed denial of service (DDoS) attacks have been a matter of serious concern for network administrators in the last two decades. These attacks target the resources such as memory, CPU cycles, and network bandwidth in order to make them unavailable for the benign users, thereby violating availability, one of the components of cyber security.
Rochak Swami +5 more
openaire +1 more source
Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering
2006 Securecomm and Workshops, 2006We present a new scheme, Distributed Filtering Service or DFS, for protecting services against Distributed Denial of Service (DDoS) attacks. Our system is proactive and requires no changes to the Internet core, and no changes to existing ISP routers. DFS can be deployed incrementally, and benefits are obtained immediately.
openaire +1 more source
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
2003As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers. There has been a lot of related work which focuses on analyzing the pattern of the DDoS attacks to protect users from them.
Sanguk Noh +3 more
openaire +1 more source
Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks
2020Distributed denial of service (DDoS) attack is one of the biggest challenges faced by the Internet community today. DDoS attack attempts to disrupt the availability of resources to the legitimate users by overwhelming the network and server resources.
Prachi Gulihar, B. B. Gupta
openaire +1 more source

