2017
DOI: 10.1016/j.cosrev.2017.07.003
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing DDoS attacks and flash events: Review, research gaps and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(23 citation statements)
references
References 24 publications
0
21
0
2
Order By: Relevance
“…Journal of Computer Networks and Communications Journal of Computer Networks and Communications detection method should not only work to achieve an academic target but also offer an option for the world cyber security in detecting HTTP DDoS attacks. e proposed solutions to DDoS are academic interest, and only some have been implemented in real time [47,48]. e use of real tools of HTTP DDoS attack will help to gain input about the current attack strategies and prediction about a future attack.…”
Section: Detection Methods For Future Workmentioning
confidence: 99%
“…Journal of Computer Networks and Communications Journal of Computer Networks and Communications detection method should not only work to achieve an academic target but also offer an option for the world cyber security in detecting HTTP DDoS attacks. e proposed solutions to DDoS are academic interest, and only some have been implemented in real time [47,48]. e use of real tools of HTTP DDoS attack will help to gain input about the current attack strategies and prediction about a future attack.…”
Section: Detection Methods For Future Workmentioning
confidence: 99%
“…Peng et al [44] and Alsaleem et al [61] proposed a rule-based mechanism by which HTTP denial of service (DoS) attacks could be detected and isolated during flash events, while in the same vein, Saad et al [62] proposed a rule-based technique for the detection of anomalous ICMPv6 behaviours; all for the purpose of reducing the rates of false positives and negatives in threat situations. Also, Jazi et al [63] proposed a technique for detecting HTTP-based DoS attacks at the application layers of web servers using sampling techniques, while Behal et al [64] reviews existing strategies and methods for characterising and isolating Distributed Denial of Service (DDoS) attacks, even in the midst of flash events. Lonea [65] proposed a quantitative method for detecting DDoS attacks in cloud environments by analysing intrusion detection system alerts, while D'Cruze [66] proposed an efficient and flexible Software-Defined Networking (SDN) solution to mitigate DDoS attacks on Internet Service Provider (ISP) networks.…”
Section: Botnet Countermeasuresmentioning
confidence: 99%
“…At present, there are 45 kinds of DDoS attacks based on TCP and UDP protocols [38][39][40]. Many researchers have proposed DDoS attack classification methods [41][42][43][44]. In view of the current types of DDoS attacks, this paper extracts 102 features by summarizing the research results of these researchers [8][9][10][11].…”
Section: System Model and Problem Statementmentioning
confidence: 99%
“…If we can acquire some features, we can lock the DDoS attack type range, which will greatly help the later DDoS mitigation. According to the method proposed by researchers in [41][42][43][44], each attack vector can be characterized by feature subsets to construct the attack vector feature tree. When a DDoS attack occurs, the attack feature tree can be used to quickly locate the DDoS attack type.…”
Section: Definition 2 One-way Flow: Refers To a List Of Data Packetsmentioning
confidence: 99%
See 1 more Smart Citation