2020
DOI: 10.1109/access.2020.2995820
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Mechanism to Mitigate Real-Time DDoS Attack

Abstract: Computer networks are subject to an unprecedented number and variety of attack, the majority of which are distributed denial of service (DDoS). The nature and mechanisms employed in these DDoS attacks continually change, creating a significant challenge for detection and management. To address this evolving nature of attacks, approaches are required that can effectively detect and mitigate emerging attacks. In this paper, we provide a mechanism that not only detects the presence of a DDoS attacks but also iden… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 40 publications
0
10
0
1
Order By: Relevance
“…Attackers usually use many computers, which are called bots or zombies, to transfer malicious traffic. The bots are often the computers compromised by attackers, while their legitimate controllers are unaware of that [5]. Figure 1 indicates a basic diagram of how a DDoS attack occurs, in which the attacker controls a botnet to employ the attack on the target.…”
Section: Introductionmentioning
confidence: 99%
“…Attackers usually use many computers, which are called bots or zombies, to transfer malicious traffic. The bots are often the computers compromised by attackers, while their legitimate controllers are unaware of that [5]. Figure 1 indicates a basic diagram of how a DDoS attack occurs, in which the attacker controls a botnet to employ the attack on the target.…”
Section: Introductionmentioning
confidence: 99%
“…A gap in the [14] study is that it does not consider offloading in the large-scale network, while the quality of offloading tasks in the network is not considered in [15]. Safety is not considered in [16], while task execution is difficult for the user in [17,18]. Modern facilities to use are not well-thought-out [19].…”
Section: Introductionmentioning
confidence: 99%
“…The compromised devices transfer a large volume of packets without any breaks over the network, tricking the victim into recognizing them as legitimate traffic. As a result, not only does the host communicate with different devices but with different types of packets as well [8]. DDoS attack has been proven as a resource battleground between the defenders and attackers; the more the resources, the higher the chance of success [9].…”
Section: Introductionmentioning
confidence: 99%