2014 IEEE Joint Intelligence and Security Informatics Conference 2014
DOI: 10.1109/jisic.2014.21
|View full text |Cite
|
Sign up to set email alerts
|

A Selective Defense for Application Layer DDoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
43
0
12

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 53 publications
(56 citation statements)
references
References 13 publications
1
43
0
12
Order By: Relevance
“…What distinguishes this type of attacks from from other types of DoS (such as flooding attacks) is that they can usually be easily solved with the installation of patches solving the identified vulnerabilities [16]. Examples of this type of issues are: -HTTP PRAGMA and HTTP POST attacks: in both of them, the adversary, takes advantage of specific HTTP requests in order to keep consuming and maintaining control of much more resources than actually needed [30]; -Coercive parsing: once received, SOAP messages have to be parsed by web services. However, in some cases such operation might become highly time-consuming and complex due to XML [58].…”
Section: Confidentiality Issuesmentioning
confidence: 99%
“…What distinguishes this type of attacks from from other types of DoS (such as flooding attacks) is that they can usually be easily solved with the installation of patches solving the identified vulnerabilities [16]. Examples of this type of issues are: -HTTP PRAGMA and HTTP POST attacks: in both of them, the adversary, takes advantage of specific HTTP requests in order to keep consuming and maintaining control of much more resources than actually needed [30]; -Coercive parsing: once received, SOAP messages have to be parsed by web services. However, in some cases such operation might become highly time-consuming and complex due to XML [58].…”
Section: Confidentiality Issuesmentioning
confidence: 99%
“…Such amplification attacks are not, however, the main topic of this paper. 4 Or alternatively two honest users that have been infected to be zombies by some attacker.…”
Section: Voip Protocols and The Coordinated Call Attackmentioning
confidence: 99%
“…According to the FBI, 200 TDoS attacks have been identified only in 2013 [2]. This paper investigates the use of selective defenses [4] for mitigating one type of TDoS attack called Coordinated Call [5] attack. The Coordinated Call attack [5] exploits the fact that pairs of attackers, Alice and Bob, can collude to exhaust the resources of the VoIP server.…”
Section: Introductionmentioning
confidence: 99%
“…Several other recent works dealt with the applicationlayer DDoS attacks, such as [18][19][20]. The work in [18] presents a solution for DDoS in the application layer wherein the authors proposed a solution based on Adaptive Selective Verification to defend an attack that targets a particular application of a server.…”
Section: Related Workmentioning
confidence: 99%
“…The work in [18] presents a solution for DDoS in the application layer wherein the authors proposed a solution based on Adaptive Selective Verification to defend an attack that targets a particular application of a server. The work in [19] copes with a set of algorithms to block attacks while allowing legitimate user traffic, including flash traffic which can only be differentiated by applicationlayer methods.…”
Section: Related Workmentioning
confidence: 99%