2017 International Conference on Circuits, Controls, and Communications (CCUBE) 2017
DOI: 10.1109/ccube.2017.8394146
|View full text |Cite
|
Sign up to set email alerts
|

Distributed denial of service: Attack techniques and mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…These features include the rate of entropy of IP source flow, packet size and number of unreachable packets of ICMP destination. Another analysis [3] devises new techniques for causing DDoS attacks and its mitigation along with the classification of those DDoS attacks In [4] the analysis of five popular machine learning algorithms, the decision tree algorithm performed better than the others in terms of overall performance.…”
Section: Literature Surveymentioning
confidence: 99%
“…These features include the rate of entropy of IP source flow, packet size and number of unreachable packets of ICMP destination. Another analysis [3] devises new techniques for causing DDoS attacks and its mitigation along with the classification of those DDoS attacks In [4] the analysis of five popular machine learning algorithms, the decision tree algorithm performed better than the others in terms of overall performance.…”
Section: Literature Surveymentioning
confidence: 99%
“…It opens connections, initiates processes, and performs transactions that would deplete finite resources like disk space and available memory. Application-level DDoS attacks are categorized into (Vanitha et al, 2017;Zargar et al, 2013): a) Flooding attacks with Reflection/Amplification: It is similar to network/transport level attack b) HTTP flooding attacks: Four varieties of this type of attacks are as follows…”
Section: Application-level Ddos Flooding Attacksmentioning
confidence: 99%
“…Current issues of antivirus companies, devoted to the identification of polymorphic code, have been analysed in this research. A new detection method has been developed using an artificial neural network based on heuristic analysis [23]. The efficacy of the experimental testing approach developed has been checked.…”
Section: Related Workmentioning
confidence: 99%