Mahjabin et al., 2017 - Google Patents
A survey of distributed denial-of-service attack, prevention, and mitigation techniquesMahjabin et al., 2017
View PDF- Document ID
- 2185750624778974559
- Author
- Mahjabin T
- Xiao Y
- Sun G
- Jiang W
- Publication year
- Publication venue
- International Journal of Distributed Sensor Networks
External Links
Snippet
Distributed denial-of-service is one kind of the most highlighted and most important attacks of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article, we present a comprehensive …
- 238000000034 method 0 title abstract description 101
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mahjabin et al. | A survey of distributed denial-of-service attack, prevention, and mitigation techniques | |
| Lyu et al. | A survey on DNS encryption: Current development, malware misuse, and inference techniques | |
| Zargar et al. | A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks | |
| Hoque et al. | Botnet in DDoS attacks: trends and challenges | |
| Kaur Chahal et al. | Distributed denial of service attacks: a threat or challenge | |
| Khattak et al. | A taxonomy of botnet behavior, detection, and defense | |
| Yan et al. | Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges | |
| Peng et al. | Survey of network-based defense mechanisms countering the DoS and DDoS problems | |
| Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
| Bhatia et al. | Distributed denial of service attacks and defense mechanisms: current landscape and future directions | |
| Bhandari et al. | Characterizing flash events and distributed denial‐of‐service attacks: an empirical investigation | |
| Haddadi et al. | DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment | |
| Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
| Gardiner et al. | Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences | |
| Hou et al. | Combating adversarial network topology inference by proactive topology obfuscation | |
| Aamir et al. | Ddos attack and defense: Review of some traditional and current techniques | |
| Haughey et al. | Adaptive traffic fingerprinting for darknet threat intelligence | |
| Saharan et al. | Prevention of DDoS attacks: a comprehensive review and future directions | |
| Yu | An overview of DDoS attacks | |
| Gaylah et al. | Mitigation and prevention methods for distributed denial-of-service attacks on network servers | |
| Sari | Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir | |
| KR101025502B1 (en) | System and method for detecting and responding to network-based IRC and HPTB botnets | |
| Poonia et al. | A Comprehensive Analysis of the Types, Impacts, Prevention, and Mitigation of DDoS Attacks | |
| Chen et al. | Detecting web-based botnets with fast-flux domains | |
| Mishra | Polys: Network-based signature generation for zero-day polymorphic worms |