2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07) 2007
DOI: 10.1109/mue.2007.157
|View full text |Cite
|
Sign up to set email alerts
|

Multi Layer Approach to Defend DDoS Attacks Caused by Spam

Abstract: Abstract

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 4 publications
0
16
0
Order By: Relevance
“…Attackers can gain easy access to email server by targeting naïve users in the local area network. If the attacker infects one end user's system by social engineering based methodology, he can launch DDoS attacks in the local area network [7]. This scenario can be explained as follows.…”
Section: Why Ddos Attacks Through Spam?mentioning
confidence: 99%
See 2 more Smart Citations
“…Attackers can gain easy access to email server by targeting naïve users in the local area network. If the attacker infects one end user's system by social engineering based methodology, he can launch DDoS attacks in the local area network [7]. This scenario can be explained as follows.…”
Section: Why Ddos Attacks Through Spam?mentioning
confidence: 99%
“…From our analysis, we can divide the attacks roughly into two categories such as server based attacks and client based attacks. The DDoS attacks through spam targets servers rather than clients [7]. Phishing attacks, password phishing, Nigerien fraud mails, social network based security threats target client data for financial gain [7,9].…”
Section: Data Collectionmentioning
confidence: 99%
See 1 more Smart Citation
“…To prevent attacks, according to [2], one may adopt methods such as intrusion detection system (IDS) [3] or firewalls, which are effective for known attacks or IP addresses. Other methods including packet filtering, packet marking, and ICMP Traceback [4][5] [6] messages, which are effective for identifying sources of attacks and instituting protection measures but are not easy to be deployed since they need supporting routers to maintain information regarding packets that pass through them.…”
Section: Introductionmentioning
confidence: 99%
“…Public networks are used as springboards Attackers are well camouflaged Packets sent by the attackers are flooding To prevent attacks, one may adopt methods such as intrusion detection system (IDS) [3] or firewalls, which are effective for known attacks or IP addresses. Other methods including packet filtering, packet marking, and ICMP Traceback [4][5] [6] messages, which are effective for identifying sources of attacks and instituting protection measures but are not easy to be deployed since they need supporting routers to maintain information regarding packets that pass through them.…”
Section: Introductionmentioning
confidence: 99%