2009 IEEE International Advance Computing Conference 2009
DOI: 10.1109/iadcc.2009.4809072
|View full text |Cite
|
Sign up to set email alerts
|

Demystifying and Rate Limiting ICMP hosted DoS/DDoS Flooding Attacks with Attack Productivity Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Previous efforts on reconnaissance detection are limited to detecting port scans. For instance, Udhayan et al [35] detect port scanning attempts by applying a set of heuristics on the connection timing and TCP header fields. Allen et al [8] note that port scanning tools leave detectable features in the generated requests.…”
Section: Chapter 2 Related Workmentioning
confidence: 99%
“…Previous efforts on reconnaissance detection are limited to detecting port scans. For instance, Udhayan et al [35] detect port scanning attempts by applying a set of heuristics on the connection timing and TCP header fields. Allen et al [8] note that port scanning tools leave detectable features in the generated requests.…”
Section: Chapter 2 Related Workmentioning
confidence: 99%
“…The ping request and ICMP flooding can be mitigated by turning pings off from external networks and rate-limiting the ICMP traffic, respectively, to prevent the bandwidth and firewall performance from being impacted [111][112][113][114]. Attacks exploiting plain-text data can be avoided by using security architecture such as IP-Sec or transport access control [115].…”
Section: Network (Layer 3)mentioning
confidence: 99%
“…JavaScript program as a part of the web page, which is first parsed in the client browser, is compiled into internal byte codes and followed by the JavaScript engine processing [7]. In order to track the use of sensitive information in JavaScript program, the function of JavaScript engine is need to extend, which is embodied in the semantics of extended byte codes instruction, so that the stain information can be effectively diffused.…”
Section: Analysis Of Stain Transmissionmentioning
confidence: 99%