2004
DOI: 10.1016/j.comnet.2003.10.003
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attacks and defense mechanisms: classification and state-of-the-art

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
302
0
4

Year Published

2006
2006
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 526 publications
(307 citation statements)
references
References 45 publications
1
302
0
4
Order By: Relevance
“…The conventional security technologies such as firewalls [8] Intrusion Detection Systems (IDSs) [9] and access control lists in routers are unable to defend networks from App-DDoS attacks. The main reason is that, it is almost impossible to differentiate between legitimate and attack packets since the potency of flooding Distributed Denial of Service attacks depends only on the volume of attack traffic and does not depend upon the exploitation of software bugs or protocol vulnerabilities.…”
Section: Discussionmentioning
confidence: 99%
“…The conventional security technologies such as firewalls [8] Intrusion Detection Systems (IDSs) [9] and access control lists in routers are unable to defend networks from App-DDoS attacks. The main reason is that, it is almost impossible to differentiate between legitimate and attack packets since the potency of flooding Distributed Denial of Service attacks depends only on the volume of attack traffic and does not depend upon the exploitation of software bugs or protocol vulnerabilities.…”
Section: Discussionmentioning
confidence: 99%
“…A denial of service (DoS) attack is an attempt to make a service, usually one offered over internet, unavailable to its legitimate users [1][2][3]. This can result in either temporary interruption in service by means of overwhelming the server with several requests or a permanent one that causes the server to crash.…”
Section: Distributed Denial Of Service Attacksmentioning
confidence: 99%
“…Such attacks can result in long term outages and can severely damage the reputation of an enterprise resulting in a decline of user trust. Thus it has become imperative to protect vulnerable servers against such attacks [1][2][3][4].…”
Section: B Effects Of Distributed Denial Of Service Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In connection with these trends, the question of computer networks security is starkly raised. Attackers have developed and actively use many types of network intrusion [1,2,3,4], most of which can be prevented by standard methods of protection.…”
Section: Introductionmentioning
confidence: 99%