Fu et al., 2011 - Google Patents
Club: a cluster based framework for mitigating distributed denial of service attacksFu et al., 2011
View PDF- Document ID
- 18410205795509617531
- Author
- Fu Z
- Papatriantafilou M
- Tsigas P
- Publication year
- Publication venue
- Proceedings of the 2011 ACM symposium on applied computing
External Links
Snippet
Distributed Denial of Service (DDoS) attacks are threats not only for the direct targets but also for the core of the network. They are also hard to detect in advance, hence methods to deal with them need to be proactive. By building on earlier work and improving on …
- 230000000116 mitigating 0 title description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abliz | Internet denial of service attacks and defense mechanisms | |
Geva et al. | Bandwidth distributed denial of service: Attacks and defenses | |
US8171562B2 (en) | System and methods for protecting against denial of service attacks | |
Liu et al. | To filter or to authorize: Network-layer DoS defense against multimillion-node botnets | |
Mahimkar et al. | Game-based analysis of denial-of-service prevention protocols | |
Mohammadi et al. | SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking | |
Yu et al. | Mitigating application layer distributed denial of service attacks via effective trust management | |
Gulihar et al. | Cooperative mechanisms for defending distributed denial of service (ddos) attacks | |
Boppana et al. | Analyzing the vulnerabilities introduced by ddos mitigation techniques for software-defined networks | |
Herzberg et al. | DNS authentication as a service: preventing amplification attacks | |
Meena et al. | Distributed denial of service attacks and their suggested defense remedial approaches | |
Fu et al. | Club: a cluster based framework for mitigating distributed denial of service attacks | |
Farhat | Protecting TCP services from denial of service attacks | |
Ghorbani et al. | Network attacks | |
Dasari et al. | Distributed denial of service attacks, tools and defense mechanisms | |
Fallah et al. | TDPF: a traceback‐based distributed packet filter to mitigate spoofed DDoS attacks | |
Alosaimi et al. | Mitigation of distributed denial of service attacks in the cloud | |
AT&T | 0.8-21shots.eps | |
AT&T | 0.8-21shots.eps | |
Otung et al. | Distributed defence of service (DiDoS): A network-layer reputation-based DDoS mitigation architecture | |
Chen et al. | A novel DDoS attack defending framework with minimized bilateral damages | |
Wendlandt et al. | Fastpass: Providing first-packet delivery | |
David et al. | Router based approach to mitigate DOS attacks on the wireless networks | |
Razmov | Denial of service attacks and how to defend against them | |
Thaper et al. | A survey on economic denial of sustainability attack mitigation techniques |