Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks

@article{BenPorat2013VulnerabilityON,
  title={Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks},
  author={Udi Ben-Porat and A. Bremler-Barr and H. Levy},
  journal={IEEE Transactions on Computers},
  year={2013},
  volume={62},
  pages={1031-1043}
}
In recent years, we have experienced a wave of DDoS attacks threatening the welfare of the internet. These are launched by malicious users whose only incentive is to degrade the performance of other, innocent, users. The traditional systems turn out to be quite vulnerable to these attacks. The objective of this work is to take a first step to close this fundamental gap, aiming at laying a foundation that can be used in future computer/network designs taking into account the malicious users. Our… Expand
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
On a Mathematical Model for Low-Rate Shrew DDoS
An Optimistic Approach to Interpret the DDoS Attacks By Wielding Deterministic Packet Marking
  • S. Suresh, N. Ram, M. Mohan
  • Computer Science
  • 2019 International Conference on Smart Structures and Systems (ICSSS)
  • 2019
An Adaptive Approach to Mitigate Ddos Attacks in Cloud
A REVIEW TOWARDS DDOS PREVENTION AND DETECTION METHODOLOGY
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY
SUBJECT CLASSIFICATION (Example: RNOMICS)
...
1
2
3
4
...

References

SHOWING 1-10 OF 27 REFERENCES
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
Exploiting the transients of adaptation for RoQ attacks on Internet resources
Denial of Service via Algorithmic Complexity Attacks
Backtracking Algorithmic Complexity Attacks against a NIDS
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
Reduction of quality (RoQ) attacks on Internet end-systems
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
On the vulnerability of the proportional fairness scheduler to retransmission attacks
Fast Content-Based Packet Handling for Intrusion Detection
...
1
2
3
...