Proceedings DARPA Active Networks Conference and Exposition
DOI: 10.1109/dance.2002.1003493
|View full text |Cite
|
Sign up to set email alerts
|

Active network based DDoS defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Rising the necessity of countermeasure of DDoS attack, multiple studies have been progressed [4,5,6,7,8,9,10]. In this paper, Machine learning method is introduced.…”
Section: Existing Ddos Attack Detion Methodsmentioning
confidence: 99%
“…Rising the necessity of countermeasure of DDoS attack, multiple studies have been progressed [4,5,6,7,8,9,10]. In this paper, Machine learning method is introduced.…”
Section: Existing Ddos Attack Detion Methodsmentioning
confidence: 99%
“…Figure 4. It utilizes a layered structure where the attacker uses a client program to connect to handlers, which are compromised systems that issue commands to the zombie agents [46], which in turn facilitate the DDoS attack. Agents are compromised via the handlers by the attacker, using automated routines to exploit vulnerabilities in programs that accept remote connections running on the targeted remote hosts.…”
Section: Denial Of Servicementioning
confidence: 99%
“…Approaches which mainly focus on mitigation and remediation are not discussed here. One approach of Sterne et al [16] detects stochastic anomalies by using a simple threshold based DDoS detection mechanism. The system consists of three components: the DDoS flood detector, a management station which dispatches an active program in case of a DDoS detection and routers which are active networking nodes and are able to execute the active program.…”
Section: Related Workmentioning
confidence: 99%