2015
DOI: 10.1016/j.comnet.2015.02.026
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attack protection in the era of cloud computing and Software-Defined Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
90
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 316 publications
(91 citation statements)
references
References 15 publications
0
90
0
1
Order By: Relevance
“…The middle-boxes can provide high DDoS attack detection performance. However, due to various interfaces provided by them, different middle-boxes seldom share information, causing them and network operators to lack holistic view of DDoS attacks [20]. Mahimkar et al in [19] proposed a method to deploy middleboxes dynamically in the protected network, but without the global perspective of a network, where deploying them could be a nerve-racking problem.…”
Section: Middle-boxes Based Defensementioning
confidence: 99%
“…The middle-boxes can provide high DDoS attack detection performance. However, due to various interfaces provided by them, different middle-boxes seldom share information, causing them and network operators to lack holistic view of DDoS attacks [20]. Mahimkar et al in [19] proposed a method to deploy middleboxes dynamically in the protected network, but without the global perspective of a network, where deploying them could be a nerve-racking problem.…”
Section: Middle-boxes Based Defensementioning
confidence: 99%
“…The experimental study showed that the growing of network topology will lead to an increase in the attack detection rate. Wang et al [9] proposed a graphical probabilistic inference model with an updating phase in order to cope with dataset shift problem which appears when the network traffic conditions differ from the actual conditions. Taekyoung and Yanghee [10] employed a content-oriented networking architecture in which each access router is called an "agent".…”
Section: Introductionmentioning
confidence: 99%
“…Incidents of attacks over the Internet especially DDOS attacks [1] are increasing day by day. News are dominated by successful DDOS attacks against a number of major Fortune 100 organizations in this arena.…”
Section: Introductionmentioning
confidence: 99%
“…Centralized collection of activities through every phase of the disruptive activity like DDOS attack [1] process can identify and alert on suspicious patterns and stop it in its tracks, even where evasive techniques such as geographical dispersion and Internet service provider (ISP) switching are employed. The purpose of the DDOS attack [3] is normally about breaking the business continuity.…”
Section: Introductionmentioning
confidence: 99%