2009
DOI: 10.1080/19393550903317070
|View full text |Cite
|
Sign up to set email alerts
|

Defending against Distributed Denial of Service Attacks: Issues and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 60 publications
(32 citation statements)
references
References 26 publications
0
32
0
Order By: Relevance
“…This leads to the production of a large amount of network traffic addressed to the target host [1]. The reflectors are often used as amplifiers by sending the stream of packets to the broadcast address 4 of the reflector network and triggering reply packets from each host within their LAN. A Reflector can be any host in the Internet able to respond to IP requests (e.g., a web server that responds to TCP SYN requests) because the attacker does not PROCEEDINGS OF THE FEDCSIS.…”
Section: A Architecture Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…This leads to the production of a large amount of network traffic addressed to the target host [1]. The reflectors are often used as amplifiers by sending the stream of packets to the broadcast address 4 of the reflector network and triggering reply packets from each host within their LAN. A Reflector can be any host in the Internet able to respond to IP requests (e.g., a web server that responds to TCP SYN requests) because the attacker does not PROCEEDINGS OF THE FEDCSIS.…”
Section: A Architecture Modelmentioning
confidence: 99%
“…Based on the strategy that is used to deny services, it is possible to classify them in two different categories [1]- [4], [7], [10], [13]: Bandwidth Depletion (or Brute-Force) and Resource Depletion.…”
Section: B Exploited Vulnerabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…So, when a huge a number of fake request or queries come to the server, the server gets busy and the actual user request cannot be entertained in that period. Hence the denial of service occurred [25].Usually, the cloud network is a distributed system, therefore, distributed denial of service happens more often [20].…”
Section: Introductionmentioning
confidence: 99%
“…DDoS attacks compromise availability of the information system through various means [1,2]. One of the major challenges in defending against DDoS attacks is to accurately detect their occurrences in the first place.…”
Section: Introductionmentioning
confidence: 99%