2018
DOI: 10.1109/tnet.2018.2874896
|View full text |Cite
|
Sign up to set email alerts
|

Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
11
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 77 publications
(13 citation statements)
references
References 26 publications
1
11
0
Order By: Relevance
“…We assume the information found in a given certificate is incorrect if the binary does not have a valid signature and certificate chain. However, we note that those findings are in line with recent findings on understanding the sources of malicious attacks [24].…”
Section: Issuer Origin and Common Namessupporting
confidence: 93%
“…We assume the information found in a given certificate is incorrect if the binary does not have a valid signature and certificate chain. However, we note that those findings are in line with recent findings on understanding the sources of malicious attacks [24].…”
Section: Issuer Origin and Common Namessupporting
confidence: 93%
“…Thus, the detection of such activity is of high importance. To detect and prevent attacks generated by cloud resources (botclouds), detection approaches for botclouds must meet the following design requirements and challenges: Data volume and velocity: Given the volume and the velocity of data generated by the monitoring probes used by the CSPs, it is essential that we consider effective but inexpensive detection approaches in terms of their resource usage and processing time that can easily scale with these features (volume and velocity). Genericity: Knowing that a botcloud or any other form of malware can cause numerous malicious activities that go beyond the sole DDoS attack, a detection approach must be sufficiently generic and extensible in order to allow the detection of all different types of malicious activities. Avoiding collateral damages: Numerous solutions that can detect attacks with high efficiency have been proposed in the past. However, they require integration with intrusion detection systems close to or even at the target location.…”
Section: Design Challenges Of Detection Approaches For Botcloudsmentioning
confidence: 99%
“…This case is referred to as the Distributed Denial of Service (DDoS) attack . Today, the Internet DDoS attacks are more prevalent with the ease of access to large numbers of infected machines, which are called botnets . As stated earlier, an immediate consequence of a successful DDoS attack is that services will become unavailable to legal customers .…”
Section: Introductionmentioning
confidence: 99%