2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B) 2017
DOI: 10.1109/icee-b.2017.8192118
|View full text |Cite
|
Sign up to set email alerts
|

Detecting SYN flood attacks via statistical monitoring charts: A comparative study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

5
4

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 14 publications
(13 reference statements)
0
9
0
Order By: Relevance
“…Nowadays, DOS and DDOS attacks are becoming a major risk that seriously affects internet service availability around the world. The main objective behind DOS and DDOS attacks is to exhaust the targeted victim's resources in such a way to render them inaccessible to their legitimate users [32]. Figure 1 shows an example of DDOS attacks.…”
Section: Icmp Smurf Attacksmentioning
confidence: 99%
“…Nowadays, DOS and DDOS attacks are becoming a major risk that seriously affects internet service availability around the world. The main objective behind DOS and DDOS attacks is to exhaust the targeted victim's resources in such a way to render them inaccessible to their legitimate users [32]. Figure 1 shows an example of DDOS attacks.…”
Section: Icmp Smurf Attacksmentioning
confidence: 99%
“…In today's interconnected culture, everybody profits from innovative data security strategies. Cyber threat relates to the body of techniques, procedures and strategies designed to avoid malicious access to the systems, computers and software's [1]. Incorporating efficient security protocols is exceptionally difficult today as there are numerous computer systems than humans and hackers have become more inventive.…”
Section: Introductionmentioning
confidence: 99%
“…Computer networks and internet are continuously exposed to many viruses and cyber-attacks [1], [2]. Denial of service and distributed denial of service (i.e., DOS and DDOS) attacks attemp to disrupt networks' availability and suspend the usability of their hosted services [3]. In last few years, several cyberattacks were performed against different targets, such as the American presidential election, the Rio De Janero Olympics games, the US Domain Name System (DYN), the Russian Banking System, Qatar News Agency, the US department of defense, the Android users, the NSA and the German armed forces [4].…”
Section: Introductionmentioning
confidence: 99%