2009
DOI: 10.1109/tnet.2008.925628
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring the Application-Layer DDoS Attacks for Popular Websites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 212 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…Many security experts and academic studies have highlighted how DDoS attacks can be executed through various vectors [4], such as volumetric attacks [5], protocol attacks, and application layer attacks [6], [7]. Examining the diversity of these vectors is crucial for understanding the full range of tactics used by threat actors to the extent where they cause disruption.…”
Section: Background Literature a Attack Vector Diversitymentioning
confidence: 99%
“…Many security experts and academic studies have highlighted how DDoS attacks can be executed through various vectors [4], such as volumetric attacks [5], protocol attacks, and application layer attacks [6], [7]. Examining the diversity of these vectors is crucial for understanding the full range of tactics used by threat actors to the extent where they cause disruption.…”
Section: Background Literature a Attack Vector Diversitymentioning
confidence: 99%
“…In addition to more accurate estimates of the required throughput, the stability and reproducibility of the dynamic rank-size statistics for very short 1 s duration fragments could be employed also in a simple scalable model of normal network traffic to be used as null hypothesis during anomaly detection. Considering recent evidence of significant changes in the rank distributions including their deviation from the expected Zipf's law in the presence of anomalies at application level [29][30][31], similar anomalies in access patterns at different network levels may be of interest for early detection and localization of suspicious and unauthorized network activity such as DDoS attacks. Finally, we believe that similar principles could be used to model other complex systems that exhibit similar superstatistical organization with long-range correlations in the intensity variations, such as biopolymers [24,32], finance [33,34], precipitation [27], seismicity [35], see also [36].…”
Section: Long-term Correlations In User Activity Patternsmentioning
confidence: 99%
“…Be that as it may, the vast majority of them have not met the prerequisites of location in the overwhelming movement condition. For instance, Yi Xie et al received a shrouded semi-Markov procedure to show the conduct of Web clients [1,3]. The concealed semi-Markov approach is an intricate calculation.…”
Section: Motivationsmentioning
confidence: 99%