[go: up one dir, main page]

Zade et al., 2011 - Google Patents

A survey on various defense mechanisms against application layer distributed denial of service attack

Zade et al., 2011

View PDF
Document ID
5329394172031535355
Author
Zade A
Patil S
Publication year
Publication venue
International Journal on Computer Science and Engineering

External Links

Snippet

The severity of application layer Distributed Denial of Service attack has become a major threat to network operators nowadays. Application layer Distributed Denial of Service attack causes unavailability of resources, revenue loss, and customer churns etc and is one of the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities

Similar Documents

Publication Publication Date Title
Jia et al. Catch me if you can: A cloud-enabled DDoS defense
Bhuyan et al. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
Thakur Analysis of denial of services (DOS) attacks and prevention techniques
Manavi Defense mechanisms against distributed denial of service attacks: A survey
Xu et al. Sustaining availability of web services under distributed denial of service attacks
Sanmorino et al. DDoS attack detection method and mitigation using pattern of the flow
Rajkumar A survey on latest DoS attacks: classification and defense mechanisms
Seo et al. APFS: adaptive probabilistic filter scheduling against distributed denial-of-service attacks
Yu et al. Mitigating application layer distributed denial of service attacks via effective trust management
Bhuyan et al. Information metrics for low-rate DDoS attack detection: A comparative evaluation
Prasad et al. Discriminating ddos attack traffic from flash crowds on internet threat monitors (itm) using entropy variations
Haddadi et al. DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
Mohammadi et al. SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking
Verma et al. A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development
Verma et al. Stopping amplified DNS DDoS attacks through distributed query rate sharing
Herzberg et al. DNS authentication as a service: preventing amplification attacks
Aamir et al. Ddos attack and defense: Review of some traditional and current techniques
Nguyen et al. Moving Target Defense‐Based Denial‐of‐Service Mitigation in Cloud Environments: A Survey
Saad et al. Rule-based detection technique for ICMPv6 anomalous behaviour
Shamsolmoali et al. C2DF: High rate DDOS filtering method in cloud computing
Rizvi et al. Defending root DNS servers against DDoS using layered defenses
Yu et al. A lightweight mechanism to mitigate application layer DDoS attacks
Zade et al. A survey on various defense mechanisms against application layer distributed denial of service attack
Wu et al. DDoS attacks on data plane of software‐defined network: are they possible?
Agrawal et al. A proactive defense method for the stealthy EDoS attacks in a cloud environment