2014 IEEE International Conference on Cloud Engineering 2014
DOI: 10.1109/ic2e.2014.38
|View full text |Cite
|
Sign up to set email alerts
|

Towards Mitigation of Low and Slow Application DDoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 38 publications
(16 citation statements)
references
References 18 publications
0
15
0
1
Order By: Relevance
“…A low-and-slow DoS attack [12], also referred to as a low-bandwidth application-layer DoS attack, is predicated on detailed knowledge of the target application. The attacker is able to slowly degrade the performance of the application by exploiting weaknesses they have identified.…”
Section: Example: Resource-consumption Attacksmentioning
confidence: 99%
“…A low-and-slow DoS attack [12], also referred to as a low-bandwidth application-layer DoS attack, is predicated on detailed knowledge of the target application. The attacker is able to slowly degrade the performance of the application by exploiting weaknesses they have identified.…”
Section: Example: Resource-consumption Attacksmentioning
confidence: 99%
“…For example, [5], [6], [7], [8] built their DDoS mitigation algorithms on SDN networks. [9], [10] used SDN to detect abnormal traffics.…”
Section: Related Workmentioning
confidence: 99%
“…If an attacker establishes a large amount of connections simultaneously, repeats the 'validation process' in the same connection continuously or responds to the authentication protocol in a low and slow manner [101], the Fog resources will become exhausted and rendered unavailable for the intended users. However, these security concerns can be reduced by building a performance model that is collecting values of memory, CPU and disk utilization and periodically comparing with estimated values [102]. In case the system identifies an anomaly, the user would be redirected to the Shark Tank cluster, which is essentially a proxy to closely monitor the user but can grant full application capabilities.…”
Section: Policy-driven Secure Management Of Resourcesmentioning
confidence: 99%