Proceedings of the 6th International Conference on Information Systems Security and Privacy 2020
DOI: 10.5220/0009091206190630
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Benign traffic and malicious data flow compose the total number of arrivals to a victim for a given time in an attack. Various methods of fighting with DDoS attacks may include challengeresponse [19], reputation-based access [20], resource limits [21], anomaly detection [22], source tracing [23], filtering, resource scaling [24], etc. It is worth mentioning that the goal of our article is to strengthen cooperation against attacks from the perspective of attacking expense.…”
Section: Attack Model and Assumptionsmentioning
confidence: 99%
“…Benign traffic and malicious data flow compose the total number of arrivals to a victim for a given time in an attack. Various methods of fighting with DDoS attacks may include challengeresponse [19], reputation-based access [20], resource limits [21], anomaly detection [22], source tracing [23], filtering, resource scaling [24], etc. It is worth mentioning that the goal of our article is to strengthen cooperation against attacks from the perspective of attacking expense.…”
Section: Attack Model and Assumptionsmentioning
confidence: 99%
“…Distributed denial of service attacks (DDoS) are a form of DoS attacks that are executed by multiple distributed agents. Since their emergence two decades ago [1], and despite a plethora of ensuing research, DDoS attacks have plagued the Internet, growing consistently in magnitude and prevalence, to become recognized by Internet Service Providers as the top operational threat to their customers [2], [3]; costing victims hundreds of thousands of dollars per attack [4], [5]. This threat is being compounded by growth in the Internet of Things (IoT) [6], [7].…”
Section: Introductionmentioning
confidence: 99%