2022
DOI: 10.1016/j.jestch.2021.09.011
|View full text |Cite
|
Sign up to set email alerts
|

A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(12 citation statements)
references
References 60 publications
0
12
0
Order By: Relevance
“…In [39], the authors used an advanced support vector machine method to detect two flooding-based DDoS attacks. In [40], the authors classified existing DoS/DDoS models in SDN. They consider three layers, including the protocol, device resources, and the network, for their analysis of the damage caused by Dos/DDoS attacks in three layers.…”
Section: A Surveys On Sdn Security and Privacy Issuesmentioning
confidence: 99%
“…In [39], the authors used an advanced support vector machine method to detect two flooding-based DDoS attacks. In [40], the authors classified existing DoS/DDoS models in SDN. They consider three layers, including the protocol, device resources, and the network, for their analysis of the damage caused by Dos/DDoS attacks in three layers.…”
Section: A Surveys On Sdn Security and Privacy Issuesmentioning
confidence: 99%
“…The IDSs analyze network traffic to identify illegal access attempts to the network or the improper use of the involved resources, as some attacks do not have the main objective of illegitimately exploiting resources but, for instance, putting them out of service, as it happens with the Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks often reported by the media [24].…”
Section: Background and Related Workmentioning
confidence: 99%
“…To address this challenge, we follow an estimation-based approach to determine the impact of the attacks sourced from the IDEs. While there is existing work on mathematical modeling of DDoS attacks to predict the probability of resource depletion and bandwidth, to estimate the impact of the attacks from the IDEs, we refer to the method proposed by Balarezo et al [23] for traffic-based models and specifically the Queuing Model. The Queuing Model uses a multidimensional approach that provides the probabilities for bandwidth, CPU, and memory exhaustion based on how networking elements process traffic.…”
Section: Estimation Performing Ddos Attacks Ethically Over Thementioning
confidence: 99%