2017
DOI: 10.1016/j.cose.2016.10.005
|View full text |Cite
|
Sign up to set email alerts
|

Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
43
0
5

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 86 publications
(51 citation statements)
references
References 12 publications
0
43
0
5
Order By: Relevance
“…Flooding attacks Differently from the other category of DoS attacks, in this case the attacker does not exploit any vulnerability at application level but seek to exhaust the target resources by producing an overwhelming quantity of requests [93]. Some examples of these attacks that can affect the Cloud are: -HTTP flooding attack : in this type of DoS attack, the adversary's goal is to generate large amounts of HTTP GET (or HTTP POST) requests that will eventually fill-up the victim's request queues [118,23,93].…”
Section: Confidentiality Issuesmentioning
confidence: 99%
“…Flooding attacks Differently from the other category of DoS attacks, in this case the attacker does not exploit any vulnerability at application level but seek to exhaust the target resources by producing an overwhelming quantity of requests [93]. Some examples of these attacks that can affect the Cloud are: -HTTP flooding attack : in this type of DoS attack, the adversary's goal is to generate large amounts of HTTP GET (or HTTP POST) requests that will eventually fill-up the victim's request queues [118,23,93].…”
Section: Confidentiality Issuesmentioning
confidence: 99%
“…The aim of such attacks is to cease the services and resources and make them unavailable to the legitimate users. The challenges, launching strategies, and defense approaches for the high‐rate DDoS attacks are provided in previous studies . These attacks can be easily detected as it involves a high volume of attack traffic.…”
Section: Introductionmentioning
confidence: 99%
“…The challenges, launching strategies, and defense approaches for the high-rate DDoS attacks are provided in previous studies. [8][9][10] These attacks can be easily detected as it involves a high volume of attack traffic. Thus, the attackers are moving towards the sophisticated or intelligent DDoS attacks launching strategies, which are stealth and difficult to detect.…”
mentioning
confidence: 99%
“…Otro aporte [10] hace una evaluación de la situación actual de los sitios web chinos utilizando plataformas reales de revelación de vulnerabilidades. Otro trabajo [11], realizó enfoque sistemático para establecer una base de datos sustancial y completa de la literatura de última generación centrada en la detección de ataques. Finalmente, en la artículo [12] se lleva a cabo una revisión sistemática de la literatura sobre vulnerabilidades y ataques XSS hechas en trabajos afines.…”
Section: Introductionunclassified