Zhang et al., 2023 - Google Patents
Revealing the Architectural Design Patterns in the Volumetric DDoS Defense Design SpaceZhang et al., 2023
View PDF- Document ID
- 11127070088576142007
- Author
- Zhang Z
- Xiao G
- Song S
- Aygun R
- Stavrou A
- Zhang L
- Osterweil E
- Publication year
- Publication venue
- Authorea Preprints
External Links
Snippet
Abstract Distributed Denial of Service (DDoS) attacks have plagued the Internet for decades. Despite the ever-increasing investments into mitigation solution development, DDoS attacks continue to grow with ever-increasing frequency and magnitude. To identify the root cause of …
- 230000007123 defense 0 title abstract description 46
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Abou El Houda et al. | Cochain-SC: An intra-and inter-domain DDoS mitigation scheme based on blockchain using SDN and smart contract | |
| Abliz | Internet denial of service attacks and defense mechanisms | |
| Chen et al. | Collaborative detection of DDoS attacks over multiple network domains | |
| US9088581B2 (en) | Methods and apparatus for authenticating an assertion of a source | |
| Gu et al. | Denial of service attacks | |
| Peng et al. | Survey of network-based defense mechanisms countering the DoS and DDoS problems | |
| Yang et al. | TVA: A DoS-limiting network architecture | |
| Bremler-Barr et al. | Spoofing prevention method | |
| Aamir et al. | A survey on DDoS attack and defense strategies: from traditional schemes to current techniques | |
| Chen et al. | Characterization of defense mechanisms against distributed denial of service attacks | |
| Nour et al. | Information-centric networking in wireless environments: Security risks and challenges | |
| Gulihar et al. | Cooperative mechanisms for defending distributed denial of service (DDoS) attacks | |
| Aamir et al. | Ddos attack and defense: Review of some traditional and current techniques | |
| Lu et al. | STOP: A service oriented internet purification against link flooding attacks | |
| Saharan et al. | Prevention of DDoS attacks: a comprehensive review and future directions | |
| Bender et al. | Accountability as a Service. | |
| Zhang et al. | Revealing protocol architecture’s design patterns in the volumetric ddos defense design space | |
| Chen et al. | Neuronet: An adaptive infrastructure for network security | |
| Chen et al. | Distributed change-point detection of DDoS attacks over multiple network domains | |
| Zhang et al. | Revealing the Architectural Design Patterns in the Volumetric DDoS Defense Design Space | |
| Yarımtepe et al. | Distributed Denial of Service Prevention Techniques | |
| Singh et al. | Selected practical and effective techniques to combat distributed denial-of-service (DDoS) attacks | |
| Luo et al. | Structure of Named Data Networks and Security Issues | |
| Shi | Understanding and Advancing the Status Quo of DDoS Defense | |
| Kumari et al. | Assessment of a Semi-supervised Machine Learning Method for Thwarting Network DDoS Assaults |