Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions

@article{Bhuyan2014DetectingDD,
  title={Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions},
  author={Monowar H. Bhuyan and Hirak Kashyap and Dhruba Kumar Bhattacharyya and Jugal K. Kalita},
  journal={Comput. J.},
  year={2014},
  volume={57},
  pages={537-556}
}
The minimal processing and best-e↵ort forwarding of any packet, malicious or not, was the prime concern when the Internet was designed. This architecture creates an unregulated network path, which can be exploited by any cyber attacker motivated by revenge, prestige, politics or money. Denial-of-service (DoS) attacks exploit this to target critical Web services [1, 2, 3, 4, 5]. This type of attack is intended to make a computer resource unavailable to its legitimate users. Denial of service… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 72 CITATIONS

PCCN: Parallel Cross Convolutional Neural Network for Abnormal Network Traffic Flows Detection in Multi-Class Imbalanced Network Traffic Flows

Yong Zhang, Xu Chen, +3 authors Xiaojuan Wang
  • IEEE Access
  • 2019
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

DDoS defence for service availability in cloud computing

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Detecting DDoS Attack Using A Multilayer Data Mining techniques

Heba S. Albiltaje, Tawfiq S. M. Barhoom
  • 2015
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

An empirical study of intelligent approaches to DDoS detection in large scale networks

  • 2019 International Conference on Computing, Networking and Communications (ICNC)
  • 2019
VIEW 2 EXCERPTS
CITES BACKGROUND

SYN Flood Attack Detection based on Bayes Estimator (SFADBE) For MANET

  • 2019 International Conference on Computer and Information Sciences (ICCIS)
  • 2019
VIEW 1 EXCERPT
CITES METHODS

Critical Investigation of Denial of Service and Distributed Denial of Service Models and Tools

  • 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2013
2019

CITATION STATISTICS

  • 5 Highly Influenced Citations

  • Averaged 8 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 78 REFERENCES

A taxonomy of DDoS attack and DDoS defense mechanisms

  • Computer Communication Review
  • 2004
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

NetBouncer: client-legitimacy-based high-performance DDoS filtering

  • Proceedings DARPA Information Survivability Conference and Exposition
  • 2003
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Attacking DDoS at the source

  • 10th IEEE International Conference on Network Protocols, 2002. Proceedings.
  • 2002
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL