2018
DOI: 10.1007/978-3-319-97643-3_3
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(28 citation statements)
references
References 69 publications
0
19
0
Order By: Relevance
“…Once such a connection has been established, the attacker generates an enormous number of HTTP requests, with the aim of flooding the victim's server and depleting its available resources. HTTP flood attacks are difficult to detect [24] because the attacker is able to mimic legitimate users' behavior, making it appear as if the HTTP requests originated from legitimate sources [25]. To conduct this type of attack, attackers use either tools such as bonesi and goldeneye or a script written by professional hackers.…”
Section: A Http Flood Attacksmentioning
confidence: 99%
“…Once such a connection has been established, the attacker generates an enormous number of HTTP requests, with the aim of flooding the victim's server and depleting its available resources. HTTP flood attacks are difficult to detect [24] because the attacker is able to mimic legitimate users' behavior, making it appear as if the HTTP requests originated from legitimate sources [25]. To conduct this type of attack, attackers use either tools such as bonesi and goldeneye or a script written by professional hackers.…”
Section: A Http Flood Attacksmentioning
confidence: 99%
“…Many research efforts have been devoted to tackle DDoS attacks leveraging ML and/or SDN [2]- [4], [14]. In what follows, we will review the main defense mechanisms proposed in the literature to handle DDoS attacks exploiting the intelligence of ML techniques and/or the flexibility provided by network programmability (i.e., SDN).…”
Section: Related Workmentioning
confidence: 99%
“…To position our work in the right perspective, we note that there are two main families of DDoS defense techniques depending on where the detection of mitigation of the DDoS attack is performed: source‐end DDoS methods and victim‐end DDoS methods . Our approach is a victim‐end DDoS defense.…”
Section: Related Workmentioning
confidence: 99%