2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) 2019
DOI: 10.1109/iccike47802.2019.9004388
|View full text |Cite
|
Sign up to set email alerts
|

Denial of Service: Types, Techniques, Defence Mechanisms and Safe Guards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Slowloris keeps a series of incomplete connections on the Web server [44]. Therefore, keeping connections open will consequently deplete the Web server's resources.…”
Section: Analyzing Slowloris Behaviormentioning
confidence: 99%
“…Slowloris keeps a series of incomplete connections on the Web server [44]. Therefore, keeping connections open will consequently deplete the Web server's resources.…”
Section: Analyzing Slowloris Behaviormentioning
confidence: 99%
“…Traditionally, a DoS cyber-attack is explored according to the vulnerability to be exploited: flooding attacks, application attacks, protocol exploitation and malformed packet attacks [ 48 ]. The first sends large volumes of traffic to the target system to congest bandwidth, saturating the response on the victim’s side; the second exploits the IP protocol addressing function in network devices to amplify and reflect a payload and send messages to all stored addresses, considerably reducing bandwidth; the third is based on the exploitation of specific features within a protocol to consume excessive amounts in its messaging process, exhausting its resources; and the last one reconstructs random high-length messages in the IP protocol, specifically in the address and packet headers, to collapse the target’s information reading process, degrading its resources [ 49 ].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Figure 1. Typical DDoS architecture [7], [10] Application DDoS attacks are web-based activities, and when they occur, all application services are put on hold [10], [11]. As these attacks increase drastically with sophisticated tools [12], [13] web application layer needs more security attention.…”
Section: Introductionmentioning
confidence: 99%