2015
DOI: 10.1007/978-3-319-19210-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Elimination of DoS UDP Reflection Amplification Bandwidth Attacks, Protecting TCP Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…In [4], we present one solution to eliminate UDP DRDoS attacks, for TCP services. In [5], we show that it is not feasible to defend against large DRDoS attacks at the company's premises or at most ISPs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [4], we present one solution to eliminate UDP DRDoS attacks, for TCP services. In [5], we show that it is not feasible to defend against large DRDoS attacks at the company's premises or at most ISPs.…”
Section: Related Workmentioning
confidence: 99%
“…In [4], we present one solution to eliminate UDP DRDoS attacks, for TCP services. In [5], we show that it is not feasible to defend against large DRDoS attacks at the company's premises or at most ISPs. In [6], we introduce the ability to perform redirects, but only for authenticated clients, to mitigate DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Web apps are vulnerable to cyber-attacks due to their widespread availability and high usage. By making a malicious request, attackers attempt to make the Web application inaccessible [4]. Attackers might corrupt a susceptible Web application, jeopardizing the organization's resources' confidentiality, integrity, and availability.…”
Section: Introductionmentioning
confidence: 99%
“…Apart from several above-mentioned merits, the number of attacks is mushrooming overwhelmingly as the number of Web applications increase [10]. Attackers attempt to make a resource unavailable so that they might take advantage by sending an anomalous request to it [11]. A resource containing a vulnerability might be exploited by the attackers, consequently can jeopardize the confidentiality, integrity, and availability properties of the organization's crucial resources [12]- [14].…”
Section: Introductionmentioning
confidence: 99%