2022
DOI: 10.1007/s10586-022-03538-x
|View full text |Cite
|
Sign up to set email alerts
|

SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks

Abstract: Distributed denial of service (DDoS) is an immense threat for Internet based-applications and their resources. It immediately floods the victim system by transmitting a large number of network packets, and due to this, the victim system resources become unavailable for legitimate users. Therefore, this attack is claimed to be a dangerous attack for Internet-based applications and their resources. Several security approaches have been proposed in the literature to protect Internet-based applications from this t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 57 publications
0
17
0
Order By: Relevance
“…F I G U R E 1 An illustration of performing DDoS attacks on Internet-based services or SDN. 9,10 F I G U R E 2 Distribution of country-wise DDoS attacks for Q2-2022 and Q3-2022. 12,13 Every nation has been floundering with the pandemic crisis from the first quarter of 2020, and therefore, people are started studying, serving, purchasing, playing etc., through online mode.…”
Section: Recent Statistical Informationmentioning
confidence: 99%
See 4 more Smart Citations
“…F I G U R E 1 An illustration of performing DDoS attacks on Internet-based services or SDN. 9,10 F I G U R E 2 Distribution of country-wise DDoS attacks for Q2-2022 and Q3-2022. 12,13 Every nation has been floundering with the pandemic crisis from the first quarter of 2020, and therefore, people are started studying, serving, purchasing, playing etc., through online mode.…”
Section: Recent Statistical Informationmentioning
confidence: 99%
“…However, most of them deployed on the Hadoop cluster to protect the victim system or network in offline or batch processing mode. Few of them 5,9,10,42,43 deployed their proposed approach on DSPF for protecting the victim system or networks in real-time mode. However, the primary focus of these systems is to protect Internet-based services and failed to protect the SDN environment from large-scale DDoS attacks.…”
Section: Organization Of the Articlementioning
confidence: 99%
See 3 more Smart Citations