2022
DOI: 10.1109/access.2022.3191430
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey

Abstract: The potential for being the target of Denial of Service (DoS) attacks is one of the most severe security threats on the Internet. Attackers have been modifying their attack format over the years, damaging specific conditions of operating systems and protocols in an attempt to deny or diminish the quality of the service provided to legitimate users. Nowadays, attacks are stealthier and mimic legitimate user traffic in such a way that detection mechanisms against High-rate DoS attacks are no longer sufficient. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 108 publications
0
9
0
Order By: Relevance
“…A high-speed network enables fast and effective communication between computers [16] [17] [18] 4 of 25 ernet, 100 Gigabit Ethernet, and InfiniBand [22]. A Cisco Report prernet protocol may cross 4.3 zettabytes in 2023, which is 1879 exabytes ].…”
Section: Architecture Of High-speed Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…A high-speed network enables fast and effective communication between computers [16] [17] [18] 4 of 25 ernet, 100 Gigabit Ethernet, and InfiniBand [22]. A Cisco Report prernet protocol may cross 4.3 zettabytes in 2023, which is 1879 exabytes ].…”
Section: Architecture Of High-speed Networkmentioning
confidence: 99%
“…In recent years, there have been several reviews in the literature of DoS attacks. For example, the authors of [ 16 ] presented the taxonomy of low-rate DoS attacks based on a three-layer modus operandi. The review included slow rate, service queue, and Quality of Service (QOS) attacks and described the various detection approaches against eight low-rate DoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Reviews of LDoS attacks exist [43,1,44,3,45], but none relates to resource-constrained ICPS. Similarly, some surveys review security concerns of the cyber-physical systems using ML/DL [46][47][48][49][50][51]; however, they do not cover LDoS or their detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…(3) LDoS attack utilises TCP/IP protocol's three-way handshake mechanism where control measures look normal; however, this can reduce the quality of service [1,2]. LDoS attack is categorized into Quality of Services (QoS), SRA, and Service-Queue attacks based on the damage to the protocols [3]. SRA slow down application layer protocols by exploiting the methods and characteristics of these protocols' architecture and/or by causing buffer overflow (sharp increase in request-servicing time) [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation