Arukonda et al., 2015 - Google Patents
The innocent perpetrators: reflectors and reflection attacksArukonda et al., 2015
View PDF- Document ID
- 400481901240281652
- Author
- Arukonda S
- Sinha S
- Publication year
- Publication venue
- Advanced Computer Science
External Links
Snippet
In this paper we make a comparable study of the various types of Reflector Denial of Service attacks popularly known as DRDoS attacks. We discuss their cause, effects, defense mechanisms proposed so far, the effectiveness of these defense mechanisms and their …
- 230000000694 effects 0 abstract description 4
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11552970B2 (en) | Efficient threat context-aware packet filtering for network protection | |
| Cheema et al. | [Retracted] Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review | |
| Arukonda et al. | The innocent perpetrators: reflectors and reflection attacks | |
| Deshmukh et al. | Understanding DDoS attack & its effect in cloud environment | |
| Masdari et al. | A survey and taxonomy of DoS attacks in cloud computing | |
| Wang et al. | Honeypot detection in advanced botnet attacks | |
| US8561188B1 (en) | Command and control channel detection with query string signature | |
| Ghafir et al. | Blacklist-based malicious ip traffic detection | |
| Kumar | Denial of service attacks–an updated perspective | |
| Kumar et al. | Review on security and privacy concerns in Internet of Things | |
| Haddadi et al. | DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment | |
| Prasad et al. | Discriminating ddos attack traffic from flash crowds on internet threat monitors (itm) using entropy variations | |
| Yadav et al. | DDA: an approach to handle DDoS (Ping Flood) attack | |
| Jeyanthi | Internet of things (IoT) as interconnection of threats (IoT) | |
| Robinson et al. | Evaluation of mitigation methods for distributed denial of service attacks | |
| Zang et al. | Botnet detection through fine flow classification | |
| WO2022225951A1 (en) | Methods and systems for efficient threat context-aware packet filtering for network protection | |
| Rajan et al. | DDoS mitigation techniques in IoT: A Survey | |
| Dahiya et al. | Honeynet based defensive mechanism against DDoS attacks | |
| Prabadevi et al. | Lattice structural analysis on sniffing to denial of service attacks | |
| US12457225B1 (en) | System and method for passive identification and detection of botnets | |
| EP4080822B1 (en) | Methods and systems for efficient threat context-aware packet filtering for network protection | |
| Nainar et al. | Network analysis and forensics | |
| Bohte et al. | Evaluation of current state of amplification-based DDoS attacks | |
| Rudman | Analysis of ntp based amplification ddos attacks |