Asosheh et al., 2008 - Google Patents
A comprehensive taxonomy of DDOS attacks and defense mechanism applying in a smart classificationAsosheh et al., 2008
View PDF- Document ID
- 14683962932180609647
- Author
- Asosheh A
- Ramezani N
- Publication year
- Publication venue
- WSEAS Transactions on Computers
External Links
Snippet
A Distributed denial of service (DDoS) attack uses multiple machines operating in concern to attack a network or site. It is the most important security problem for IT managers. These attacks are very simple organized for intruders and hence so disruptive. The detection and …
- 238000001514 detection method 0 abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Asosheh et al. | A comprehensive taxonomy of DDOS attacks and defense mechanism applying in a smart classification | |
Rahman et al. | DDoS attacks detection and mitigation in SDN using machine learning | |
Bawany et al. | DDoS attack detection and mitigation using SDN: methods, practices, and solutions | |
Masdari et al. | A survey and taxonomy of DoS attacks in cloud computing | |
Dayal et al. | Research trends in security and DDoS in SDN | |
Khairi et al. | A Review of Anomaly Detection Techniques and Distributed Denial of Service (DDoS) on Software Defined Network (SDN). | |
Kaur Chahal et al. | Distributed denial of service attacks: a threat or challenge | |
Prasad et al. | DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey | |
Mirkovic et al. | A taxonomy of DDoS attack and DDoS defense mechanisms | |
Feily et al. | A survey of botnet and botnet detection | |
US7308715B2 (en) | Protocol-parsing state machine and method of using same | |
Yusof et al. | Systematic literature review and taxonomy for DDoS attack detection and prediction | |
Acharya et al. | Survey of DDoS attacks based on TCP/IP protocol vulnerabilities | |
Krishnan et al. | An adaptive distributed intrusion detection system for cloud computing framework | |
Agrawal et al. | A lightweight approach to detect the low/high rate IP spoofed cloud DDoS attacks | |
Karnani et al. | A comprehensive survey on low-rate and high-rate DDoS defense approaches in SDN: taxonomy, research challenges, and opportunities | |
Tariq et al. | A comprehensive categorization of DDoS attack and DDoS defense techniques | |
Verma et al. | Stopping amplified DNS DDoS attacks through distributed query rate sharing | |
Robinson et al. | Evaluation of mitigation methods for distributed denial of service attacks | |
Hirsi et al. | Comprehensive analysis of ddos anomaly detection in software-defined networks | |
Alsadhan et al. | Detecting NDP distributed denial of service attacks using machine learning algorithm based on flow-based representation | |
Keshariya et al. | DDoS defense mechanisms: A new taxonomy | |
Keshri et al. | DoS attacks prevention using IDS and data mining | |
Vrat et al. | Anomaly detection in IPv4 and IPv6 networks using machine learning | |
Khosravifar et al. | An experience improving intrusion detection systems false alarm ratio by using honeypot |