2011
DOI: 10.1007/978-3-642-24037-9_57
|View full text |Cite
|
Sign up to set email alerts
|

A Recent Survey on DDoS Attacks and Defense Mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(29 citation statements)
references
References 8 publications
0
28
0
Order By: Relevance
“…Attacks on CIDSs can be classified into internal and external attacks based on the scope of the attackers. In an external attack, the adversary may try to detect the presence of a CIDS, launch evasion attacks, or attack specific components of the IDS directly, for example by degrading its service availability via a Distributed Denial of Service (DDoS) attack [Srivastava et al 2011]. Internal attacks refer to malicious behavior originated from within the monitored network.…”
Section: Attacks On Cidsmentioning
confidence: 99%
“…Attacks on CIDSs can be classified into internal and external attacks based on the scope of the attackers. In an external attack, the adversary may try to detect the presence of a CIDS, launch evasion attacks, or attack specific components of the IDS directly, for example by degrading its service availability via a Distributed Denial of Service (DDoS) attack [Srivastava et al 2011]. Internal attacks refer to malicious behavior originated from within the monitored network.…”
Section: Attacks On Cidsmentioning
confidence: 99%
“…Authors of [1] have classified DDoS attacks in two categories as flooding and logical (software) attacks. In flooding attacks, they have highlighted SYN flooding, ICMP attack, UDP flooding and in logical attack they have identified ping of death, teardrop attack, and land attack.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The DDoS attacks can be launched from multiple environments, likefromsome specific service,virtual machine, some node, some cluster or in the whole cloud environment.In this article we present different DDoS attack detection and prevention techniques at different levels [26].…”
Section: Fig1: Ddos Attackmentioning
confidence: 99%