2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim) 2015
DOI: 10.1109/uksim.2015.52
|View full text |Cite
|
Sign up to set email alerts
|

A Simulation Model for the Analysis of DDoS Amplification Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Analysis in this case showed that the similarity between some of the IP addresses implied that the attacker had targeted hosts in the same subnetwork. Furfaro et al [76] cite this exploitation as a common means to perform reflective DDoS attack, with great bandwidth exhaustion power. To avoid this exploitation, Monlist command should not be permitted to public hosts, but only internally, for management purposes, and DPI devices should drop packets with NTP request code equal to 42.…”
Section: Traffic Analysis Of Port 123mentioning
confidence: 99%
“…Analysis in this case showed that the similarity between some of the IP addresses implied that the attacker had targeted hosts in the same subnetwork. Furfaro et al [76] cite this exploitation as a common means to perform reflective DDoS attack, with great bandwidth exhaustion power. To avoid this exploitation, Monlist command should not be permitted to public hosts, but only internally, for management purposes, and DPI devices should drop packets with NTP request code equal to 42.…”
Section: Traffic Analysis Of Port 123mentioning
confidence: 99%
“…Once suspicious flows are found, it estimates the rating association between flow pairs and generates a final alert according to preset thresholds. Angelo Furfaro et al [12] discuss a measure based on Hurst measurement to recognize short -degree DDoS attacks. Alexandre et al [2] present an empirical evaluation of the suitability of various information metrics to recognize both short -degree and high-degree DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang and Green [18] propose and test a lightweight defensive algorithm for DDoS attack over an IoT network environment. Furfaro, Malena, Molina, and Parise [19] built a simulation tool for Domain Name Service (DNS)-based AR-DDoS. Hu [20] described DDoS attacks in IoT architectures.…”
Section: Related Workmentioning
confidence: 99%