2016 10th International Conference on Intelligent Systems and Control (ISCO) 2016
DOI: 10.1109/isco.2016.7727096
|View full text |Cite
|
Sign up to set email alerts
|

A survey of distributed denial of service attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(34 citation statements)
references
References 13 publications
0
34
0
Order By: Relevance
“…Honeypot is used as a mitigation method for DDoS Attacks. Honeypots can't prevent a DDoS attack but they are used lure attackers to carry out DDoS on Honeypot servers, once the attack is carried out, Honeypot understands the attack type and also tries to detect attacker and by detecting the origin of attack it will effectively prevent future attacks [5].…”
Section: Honeypot Methodsmentioning
confidence: 99%
“…Honeypot is used as a mitigation method for DDoS Attacks. Honeypots can't prevent a DDoS attack but they are used lure attackers to carry out DDoS on Honeypot servers, once the attack is carried out, Honeypot understands the attack type and also tries to detect attacker and by detecting the origin of attack it will effectively prevent future attacks [5].…”
Section: Honeypot Methodsmentioning
confidence: 99%
“…The lack of data sets of denial of service attacks in application layer was the motivation of the authors [14]. The authors [13], [26], [18] presented a detection model based in CUSUM algorithm, that has already been used in detecting of DoS attacks and they aim on DoS attacks that produce a small amount of packets to disturb the network service.…”
Section: Related Workmentioning
confidence: 99%
“…A denial of service attack [4] is an effort to make one or more computer systems unavailable. It is typically targeted at web servers, but it can also be used on mail servers, name servers, and any other type of computer system.…”
Section: Dos Attackmentioning
confidence: 99%
“…Denial of service (DoS) attacks may be initiated from a single machine, but they typically use many computers to carry out an attack. Since most servers have firewalls and other security software installed, it is easy to SOURCE NODE (ATTACKER) [4] are often used to coordinate multiple systems in a simultaneous attack. A distributed denial of service attack intimate all coordinated systems to send a stream of requests to a specific server at the same time.…”
Section: Dos Attackmentioning
confidence: 99%