2022
DOI: 10.1016/j.jksuci.2019.06.016
|View full text |Cite
|
Sign up to set email alerts
|

E-Had: A distributed and collaborative detection framework for early detection of DDoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 18 publications
0
19
0
Order By: Relevance
“…Sachdeva et al 30 recommended the distributed internet service provider (ISP) domain DDoS deployment because of several reasons: (i) Distributed environment, (ii) Practically feasible solution, (iii) Robust implementation, (v) Autonomous control, etc. Further, few researchers 31‐43 proposed distributed processing framework‐based DDoS detection systems. This type of deployment not only quickly recognizes attacks but also efficiently explores a huge volume of traffic by employing a cluster of slaves in a coordinated manner.…”
Section: A Ddos Defense Deployment Taxonomymentioning
confidence: 99%
See 2 more Smart Citations
“…Sachdeva et al 30 recommended the distributed internet service provider (ISP) domain DDoS deployment because of several reasons: (i) Distributed environment, (ii) Practically feasible solution, (iii) Robust implementation, (v) Autonomous control, etc. Further, few researchers 31‐43 proposed distributed processing framework‐based DDoS detection systems. This type of deployment not only quickly recognizes attacks but also efficiently explores a huge volume of traffic by employing a cluster of slaves in a coordinated manner.…”
Section: A Ddos Defense Deployment Taxonomymentioning
confidence: 99%
“…Each class of traditional frameworks‐based DDoS defense deployment summarized in Table 2. There are several challenges in the traditional framework‐based DDoS deployment model: 5,43,54,91,92 The traditional framework‐based DDoS defense system can deploy on single or multiple machines. However, no communication between them while analyzing network traffic flows. Each machine performs its task separately.…”
Section: A Ddos Defense Deployment Taxonomymentioning
confidence: 99%
See 1 more Smart Citation
“…Rodrigues et al [28] Javaid et al [27] Rodrigues et al [26] François et al [35] Chen et al [36] Chin et al [37] Patil et al [38] Sagirlar et al [39] Our approach…”
Section: Responsiveness Scalabilitymentioning
confidence: 99%
“…et al and Behal et al worked on DDoS just for early detection[21,22]. Previous studies have almost exclusively focused on a specific traffic type or have only attack detection mechanism.Today, the industry-standard mitigation infrastructures which target DDoS attacks work with the BGP Protocol.…”
mentioning
confidence: 99%