2021
DOI: 10.1016/j.cose.2021.102380
|View full text |Cite
|
Sign up to set email alerts
|

A review of amplification-based distributed denial of service attacks and their mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Protocol attacks involve sending a flood of traffic with false data to the server, causing data overflow, server crashes, and rendering the resources of the server unavailable. For instance, Border Gateway Protocol (BGP) and ping of death [ 108 ].…”
Section: Issues and Challengesmentioning
confidence: 99%
“…Protocol attacks involve sending a flood of traffic with false data to the server, causing data overflow, server crashes, and rendering the resources of the server unavailable. For instance, Border Gateway Protocol (BGP) and ping of death [ 108 ].…”
Section: Issues and Challengesmentioning
confidence: 99%
“…3 The distributed Reflection Denial of Service set up indirect attacks. [4][5][6][7] Attackers involve the intermediate persons to the affected victims instantly.…”
Section: Introductionmentioning
confidence: 99%
“…The weak direct attack occurs mainly in the Network Layer, Transport Layer, and Application Layer 3 . The distributed Reflection Denial of Service set up indirect attacks 4–7 . Attackers involve the intermediate persons to the affected victims instantly.…”
Section: Introductionmentioning
confidence: 99%