2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA) 2017
DOI: 10.1109/icimia.2017.7975595
|View full text |Cite
|
Sign up to set email alerts
|

Alleviation of DDoS attack using advance technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…In addition, the author distinguishes methods of DDoS detective work based on viewing, blocking, detecting, and minimizing comments. In [32], a step-by-step approach to DDoS attack mitigation was presented, where the entire process of mitigating DDoS attacks was forced to a single layer or multiple layers. To increase the security of DDoS attacks, the go-layer process has become a useful solution.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, the author distinguishes methods of DDoS detective work based on viewing, blocking, detecting, and minimizing comments. In [32], a step-by-step approach to DDoS attack mitigation was presented, where the entire process of mitigating DDoS attacks was forced to a single layer or multiple layers. To increase the security of DDoS attacks, the go-layer process has become a useful solution.…”
Section: Literature Reviewmentioning
confidence: 99%
“…More recently, Bin Fan and others proposed Cuckoo Filter [18] that supports count and deletion operations, does not introduce false negatives during deletion operation, has fewer bits per entry for optimum false positive rate (< 3%), and can maintain stable false positive rate with higher load for up to 95%. After its introduction, recently, several research works have used Cuckoo Filter to speed up the lookup process in the areas of Networking and Security [25] [26] [27] [28] [29]. However, there have not been significant researches utilizing Cuckoo Filter in the area of Big Data -only a few on semi-structured data [30], encrypted data [31] and dynamic data-sets [32].…”
Section: Related Workmentioning
confidence: 99%
“…In their model, the diffserv was based on network nodes applying different forwarding treatments to packets with those IP headers were marked with different Diffserv Codepoints (DSCPs). By Vishal V. Mahale et al, a co-operative cross layer mechanism for mitigation of DDoS attack was introduced [28]. In their consideration, to enhance the overall reliability against DDoS attacks, a combination of Device-Driver Packet Filter and Remote Firewall were a solution as a cross-layer approach in their model.…”
Section: Introductionmentioning
confidence: 99%