2021
DOI: 10.21608/bfemu.2021.211300
|View full text |Cite
|
Sign up to set email alerts
|

HDSL: A Hybrid Distributed Single-packet Low-storage IP Traceback Framework. (Dept. E)

Abstract: I-INTRODUCTIONhere is no doubt that many DDoS attacks have been reported daily all over the world, these attacks aim to hinder legitimate users from accessing a corporation services or resources, resulting in a revenue loss. The attackers rely on the fact that Internet routing infrastructure is mainly concerned by scalability rather security, since routers neither validate source IP address nor log information regarding the forwarded packets [1]. DDoS attack methods could be classified according to the number … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…To improve the accuracy and speed of the classification process, two techniques based on signatures [11,18] and deep learning are employed to classify suspicious packets executed at the controller plane. Signature-based systems basically use intermediate routers to compose unique patterns (signature) for every packet passing through the network [19]. An attack signature database stores the signatures of malicious packets, allowing them to be matched later against any attack packet containing a signature.…”
Section: Introductionmentioning
confidence: 99%
“…To improve the accuracy and speed of the classification process, two techniques based on signatures [11,18] and deep learning are employed to classify suspicious packets executed at the controller plane. Signature-based systems basically use intermediate routers to compose unique patterns (signature) for every packet passing through the network [19]. An attack signature database stores the signatures of malicious packets, allowing them to be matched later against any attack packet containing a signature.…”
Section: Introductionmentioning
confidence: 99%