4.2 Review

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data

Jian Shen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

A survey of intrusion detection systems in smart grid

Julius Jow et al.

INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2017)

Article Computer Science, Information Systems

A secure cloud-assisted urban data sharing framework for ubiquitous-cities

Jian Shen et al.

PERVASIVE AND MOBILE COMPUTING (2017)

Review Computer Science, Information Systems

DDoS attacks in cloud computing: Issues, taxonomy, and future directions

Gaurav Somani et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

A distributed filtering mechanism against DDoS attacks: ScoreForCore

Kubra Kalkan et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Hardware & Architecture

A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking

Shui Yu et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Theory & Methods

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement

Zhangjie Fu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

Zhihua Xia et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric

Monowar H. Bhuyan et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

Election-based method for fault tolerance in a hierarchical sensor network (EFTOHSN): a case study of an indoor localisation system

Mohamed Naili et al.

International Journal of Sensor Networks (2016)

Article Computer Science, Hardware & Architecture

DDoS attack protection in the era of cloud computing and Software-Defined Networking

Bing Wang et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Theory & Methods

Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter

Guang Yao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Fault-tolerant topology evolution and analysis of sensing systems in IoT based on complex networks

Shuming Xiong et al.

INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2015)

Article Computer Science, Information Systems

High performance simulation technology in the Internet of Things

Buquan Liu

INTERNATIONAL JOURNAL OF SENSOR NETWORKS (2015)

Article Computer Science, Information Systems

A moving target DDoS defense mechanism

Huangxin Wang et al.

COMPUTER COMMUNICATIONS (2014)

Article Computer Science, Information Systems

ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters

S. Saurabh et al.

COMPUTER COMMUNICATIONS (2014)

Article Telecommunications

DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy

Xinlei Ma et al.

IEEE COMMUNICATIONS LETTERS (2014)

Article Computer Science, Theory & Methods

Can We Beat DDoS Attacks in Clouds?

Shui Yu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

A transform domain-based anomaly detection approach to network-wide traffic

Dingde Jiang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Hardware & Architecture

Cyber security in the Smart Grid: Survey and challenges

Wenye Wang et al.

COMPUTER NETWORKS (2013)

Article Computer Science, Information Systems

Security and Privacy in Cloud Computing

Zhifeng Xiao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Information Systems

Cyber Security and Privacy Issues in Smart Grids

Jing Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)

Article Computer Science, Theory & Methods

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics

Yang Xiang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Telecommunications

Security Challenges in the IP-based Internet of Things

Tobias Heer et al.

WIRELESS PERSONAL COMMUNICATIONS (2011)

Article Computer Science, Information Systems

NetFence: Preventing Internet Denial of Service from Inside Out

Xin Liu et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2010)

Article Computer Science, Information Systems

Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications

Bo Sun et al.

AD HOC NETWORKS (2009)

Article Computer Science, Hardware & Architecture

Flow-Net Methodology for Accountability in Wireless Networks

Yang Xiao

IEEE NETWORK (2009)

Article Computer Science, Theory & Methods

Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks

Yang Xiang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)

Article Computer Science, Hardware & Architecture

A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors

Yi Xie et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2009)

Article Computer Science, Information Systems

To filter or to authorize: Network-layer DoS Defense against multimillion-node botnets

Xin Liu et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2008)

Article Computer Science, Hardware & Architecture

Controlling IP Spoofing through Interdomain Packet Filters

Zhenhai Duan et al.

IEEE Transactions on Dependable and Secure Computing (2008)

Article Computer Science, Hardware & Architecture

Probabilistic packet marking for large-scale IP traceback

Michael T. Goodrich

IEEE-ACM TRANSACTIONS ON NETWORKING (2008)

Article Engineering, Electrical & Electronic

Detection of fraudulent usage in wireless networks

Bo Sun et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2007)

Article Computer Science, Hardware & Architecture

Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks

Bo Sun et al.

IEEE WIRELESS COMMUNICATIONS (2007)

Article Computer Science, Theory & Methods

Survey of network-based defense mechanisms countering the DoS and DDoS problems

Tao Peng et al.

ACM COMPUTING SURVEYS (2007)

Article Engineering, Electrical & Electronic

StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense

Abraham Yaar et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)

Article Computer Science, Information Systems

Capacity overprovisioning for networks with resilience requirements

Michael Menth et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2006)

Article Computer Science, Hardware & Architecture

PacketScore:: A statistics-based packet filtering scheme against distributed denial-of-service attacks

Y Kim et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2006)

Article Computer Science, Information Systems

Policing congestion response in an internetwork using re-feedback

B Briscoe et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2005)

Article Computer Science, Information Systems

A DoS-limiting network architecture

XW Yang et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2005)

Article Computer Science, Theory & Methods

You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers

TKT Law et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2005)

Article Computer Science, Information Systems

Mitigating denial of service attacks: A tutorial

Jarmo Molsa

JOURNAL OF COMPUTER SECURITY (2005)

Article Computer Science, Hardware & Architecture

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris et al.

COMPUTER NETWORKS (2004)

Article Computer Science, Information Systems

A taxonomy of DDoS attack and DDoS Defense mechanisms

J Mirkovic et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2004)

Review Computer Science, Theory & Methods

Replication for Web hosting systems

S Sivasubramanian et al.

ACM COMPUTING SURVEYS (2004)

Article Telecommunications

IP traceback with deterministic packet marking

A Belenky et al.

IEEE COMMUNICATIONS LETTERS (2003)

Article Computer Science, Information Systems

SOS: Secure Overlay Services

AD Keromytis et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2002)

Article Computer Science, Information Systems

Controlling high bandwidth aggregates in the network

R Mahajan et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2002)

Article Computer Science, Information Systems

On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets

K Park et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2001)

Article Computer Science, Information Systems

Practical network support for IP traceback

S Savage et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2000)