[go: up one dir, main page]

Mahjabin et al., 2017 - Google Patents

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

Mahjabin et al., 2017

View PDF
Document ID
2185750624778974559
Author
Mahjabin T
Xiao Y
Sun G
Jiang W
Publication year
Publication venue
International Journal of Distributed Sensor Networks

External Links

Snippet

Distributed denial-of-service is one kind of the most highlighted and most important attacks of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article, we present a comprehensive …
Continue reading at journals.sagepub.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Mahjabin et al. A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Lyu et al. A survey on DNS encryption: Current development, malware misuse, and inference techniques
Zargar et al. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
Hoque et al. Botnet in DDoS attacks: trends and challenges
Kaur Chahal et al. Distributed denial of service attacks: a threat or challenge
Khattak et al. A taxonomy of botnet behavior, detection, and defense
Yan et al. Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges
Peng et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
Bhatia et al. Distributed denial of service attacks and defense mechanisms: current landscape and future directions
Bhandari et al. Characterizing flash events and distributed denial‐of‐service attacks: an empirical investigation
Haddadi et al. DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Gardiner et al. Command & Control: Understanding, Denying and Detecting-A review of malware C2 techniques, detection and defences
Hou et al. Combating adversarial network topology inference by proactive topology obfuscation
Aamir et al. Ddos attack and defense: Review of some traditional and current techniques
Haughey et al. Adaptive traffic fingerprinting for darknet threat intelligence
Saharan et al. Prevention of DDoS attacks: a comprehensive review and future directions
Yu An overview of DDoS attacks
Gaylah et al. Mitigation and prevention methods for distributed denial-of-service attacks on network servers
Sari Countrywide virtual siege in the new era of cyberwarfare: remedies from the cyber-firewall: Seddulbahir
KR101025502B1 (en) System and method for detecting and responding to network-based IRC and HPTB botnets
Poonia et al. A Comprehensive Analysis of the Types, Impacts, Prevention, and Mitigation of DDoS Attacks
Chen et al. Detecting web-based botnets with fast-flux domains
Mishra Polys: Network-based signature generation for zero-day polymorphic worms