2015
DOI: 10.1016/s1353-4858(15)30092-1
|View full text |Cite
|
Sign up to set email alerts
|

The growth and evolution of DDoS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0
2

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(36 citation statements)
references
References 0 publications
0
34
0
2
Order By: Relevance
“…However, it is still an open issue since DDoS attacks are growing in scale, sophistication, duration and frequency [10]. The IETF is currently proposing a protocol [13] called DOTS (DDoS Open Threat Signaling) covering both intraorganization and inter-organization communications to advertise attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it is still an open issue since DDoS attacks are growing in scale, sophistication, duration and frequency [10]. The IETF is currently proposing a protocol [13] called DOTS (DDoS Open Threat Signaling) covering both intraorganization and inter-organization communications to advertise attacks.…”
Section: Related Workmentioning
confidence: 99%
“…DDoS attacks have the simple goal of interrupting or suspending services available on the Internet and its motivations range from personal grudges over blackmail to political reasons [10]. A recent example is an attack conducted against Domain Name System (DNS) servers responsible for domains such as Twitter, PayPal, and Spotify [20] in October 2016.…”
Section: Introductionmentioning
confidence: 99%
“…A different flavor of DoS is Distributed DoS, or DDoS, where attackers are a group of machines targeting a particular service [5]. There is a high rise in the number of reported incidents of DDoS, which makes it one of the most important and fatal threat amongst many [6].…”
Section: Introductionmentioning
confidence: 99%
“…Or on the other hand perhaps, they hope to make your site and servers blocked off to bona fide customers. DDoS can in like manner be used as a smokescreen for various malicious activities and to cut down security contraptions, breaking the target's security edge [3]. A productive DDoS ambush is an extraordinarily perceptible event influencing an entire online customer base.…”
Section: Introductionmentioning
confidence: 99%