2013 International Conference on Information Communication and Embedded Systems (ICICES) 2013
DOI: 10.1109/icices.2013.6508330
|View full text |Cite
|
Sign up to set email alerts
|

A packet marking approach to protect cloud environment against DDoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Anitha et al [10] proposed the use of packet marking approach for the detection of DoS attack. CLASSIE, rule set-based detection, was used to discriminate between legitimate and illegitimate attacks.…”
Section: Malicious Detectionmentioning
confidence: 99%
“…Anitha et al [10] proposed the use of packet marking approach for the detection of DoS attack. CLASSIE, rule set-based detection, was used to discriminate between legitimate and illegitimate attacks.…”
Section: Malicious Detectionmentioning
confidence: 99%
“…The result shows that the overall performance of this algorithm in detection accuracy and time consumption is superior to existing models. Regarding DDoS attacks, various detection strategies such as detection [36][37][38][39][40][41][42][43][44][45], mitigation [46][47][48][49][50][51][52][53][54] and Defence techniques [55][56][57][58][59][60][61][62][63][64][65][66] proposed for the cloud, and the performance compared. The comparative analysis based on the above said categories are given in Table-5, Table-6, and Table-7.…”
Section: A Survey Of Ddos Attacksmentioning
confidence: 99%
“…HTTP Flood [30] which does not use malfunctioning, spoofing otherwise reflex methods although targets Web server or application with legit HTTP GET or POST requests. The attacker attempts this attack.…”
Section: Types Of Ddos Attacksmentioning
confidence: 99%