Zade et al., 2011 - Google Patents
A survey on various defense mechanisms against application layer distributed denial of service attackZade et al., 2011
View PDF- Document ID
- 5329394172031535355
- Author
- Zade A
- Patil S
- Publication year
- Publication venue
- International Journal on Computer Science and Engineering
External Links
Snippet
The severity of application layer Distributed Denial of Service attack has become a major threat to network operators nowadays. Application layer Distributed Denial of Service attack causes unavailability of resources, revenue loss, and customer churns etc and is one of the …
- 238000000034 method 0 abstract description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jia et al. | Catch me if you can: A cloud-enabled DDoS defense | |
Bhuyan et al. | An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection | |
Thakur | Analysis of denial of services (DOS) attacks and prevention techniques | |
Manavi | Defense mechanisms against distributed denial of service attacks: A survey | |
Xu et al. | Sustaining availability of web services under distributed denial of service attacks | |
Sanmorino et al. | DDoS attack detection method and mitigation using pattern of the flow | |
Rajkumar | A survey on latest DoS attacks: classification and defense mechanisms | |
Seo et al. | APFS: adaptive probabilistic filter scheduling against distributed denial-of-service attacks | |
Yu et al. | Mitigating application layer distributed denial of service attacks via effective trust management | |
Bhuyan et al. | Information metrics for low-rate DDoS attack detection: A comparative evaluation | |
Prasad et al. | Discriminating ddos attack traffic from flash crowds on internet threat monitors (itm) using entropy variations | |
Haddadi et al. | DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment | |
Mohammadi et al. | SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking | |
Verma et al. | A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development | |
Verma et al. | Stopping amplified DNS DDoS attacks through distributed query rate sharing | |
Herzberg et al. | DNS authentication as a service: preventing amplification attacks | |
Aamir et al. | Ddos attack and defense: Review of some traditional and current techniques | |
Nguyen et al. | Moving Target Defense‐Based Denial‐of‐Service Mitigation in Cloud Environments: A Survey | |
Saad et al. | Rule-based detection technique for ICMPv6 anomalous behaviour | |
Shamsolmoali et al. | C2DF: High rate DDOS filtering method in cloud computing | |
Rizvi et al. | Defending root DNS servers against DDoS using layered defenses | |
Yu et al. | A lightweight mechanism to mitigate application layer DDoS attacks | |
Zade et al. | A survey on various defense mechanisms against application layer distributed denial of service attack | |
Wu et al. | DDoS attacks on data plane of software‐defined network: are they possible? | |
Agrawal et al. | A proactive defense method for the stealthy EDoS attacks in a cloud environment |