2016
DOI: 10.1007/s00542-016-2978-0
|View full text |Cite
|
Sign up to set email alerts
|

DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…The PSO-1NN, PSO-5NN, and PSO-7NN were constructed to report the best achieved results after comparing their performance values in both software product and process experiments. In terms of PSO, we employed the default values of PSO as suggested in the studies ( He, Ma & Zhang, 2016 ; Boro & Bhattacharyya, 2017 ), the parameters setting of the PSO can be found in Table 1 .…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The PSO-1NN, PSO-5NN, and PSO-7NN were constructed to report the best achieved results after comparing their performance values in both software product and process experiments. In terms of PSO, we employed the default values of PSO as suggested in the studies ( He, Ma & Zhang, 2016 ; Boro & Bhattacharyya, 2017 ), the parameters setting of the PSO can be found in Table 1 .…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The magnitudes of DDoS attacks have increased over the last decade. For example, in 2012, a botnet-based DDoS attack flooded a group of US banks with up to 75 Gbps of malicious traffic [10], while in 2013, a nonprofit organization named Spamhaus suffered a massive DDoS attack involving 300 Gbps of traffic [11]. In 2014, an unnamed Internet service provider was attacked by a network time protocol that generated traffic of up to 400 Gbps, which led to it becoming inaccessible to clients [12].…”
Section: Background and Motivationmentioning
confidence: 99%
“…Fig. 2 demonstrates the increasing magnitudes of DDoS attacks in recent years [10]- [15], [119]. DDoS attacks have a significant impact on businesses due to the associated operating and financial costs [16].…”
Section: Background and Motivationmentioning
confidence: 99%
“…Entropy variations. To detect slow request or response attacks, users can find the difference in the entropy values (flow-header features and behavioral features) of attack packets at the source or destination IP address and their corresponding ports [14]. In [15], short term entropy was employed for early attack detection and long term entropy for attack classification.…”
Section: Ddos Attack Defense Techniquesmentioning
confidence: 99%