2016
DOI: 10.1007/s00521-016-2317-5
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0
3

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 188 publications
(57 citation statements)
references
References 38 publications
0
54
0
3
Order By: Relevance
“…Our research therefore brings a new model to reduce congestion so that botnet detection systems can be deployed more easily on congested networks. In currently available identification methods for botnets, most of them use deep packet inspection (DPI) to evaluate packets content that is complicated and expensive and ineffective to simulate unidentified payload signatures [30]. It is assumed that the payload of each packet in DPI can be accessed by the system.…”
Section: First Layer: Traffic Reductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our research therefore brings a new model to reduce congestion so that botnet detection systems can be deployed more easily on congested networks. In currently available identification methods for botnets, most of them use deep packet inspection (DPI) to evaluate packets content that is complicated and expensive and ineffective to simulate unidentified payload signatures [30]. It is assumed that the payload of each packet in DPI can be accessed by the system.…”
Section: First Layer: Traffic Reductionmentioning
confidence: 99%
“…In addition, it is a costly task to evaluate all the packets on the congested networks because the amount of the packets transmitted through the networks are increasing day by day. Consequently, the DPI detection system can suffer from efficiency limited to the processing of the traffic from high-speed networks [30]. This study aims to improve the efficiency by reducing the amount of packets without hampering the precision rate.…”
Section: First Layer: Traffic Reductionmentioning
confidence: 99%
“…It affects the quality that the network bandwidth can support, of computer network services, through a packet overload, so legitimate requests can not be answered properly [11]. Depending on the strategy used, the DoS can be categorized in Volume Based Attack, Protocol Attack or Application Level Attack [27].…”
Section: Criminal Cyber Attacks Outside the Lawmentioning
confidence: 99%
“…Offenders, also known as crackers, take advantage of failures in services, applications or communications that operate over the internet with the aim of damaging, stealing data, causing unavailability of services or even destroying data. The Denial of Service (DoS) and its variation called the Distributed Denial of Service (DDoS) are examples of attacks that have being growing up [27] and many users or service providers, who are suffering these attacks, do not have any information about them because of the lack of monitoring investment.…”
Section: Introductionmentioning
confidence: 99%
“…These half-opened connections will be initially stored in a backlog queue but when its maximum size is reached, the server will deny all subsequent connections [6] making its services unavailable for other clients; -UDP flooding attack : in this type of attack the connectionless and unreliable features of UDP are exploited to make the target system unreachable [93]. An example of UDP flooding attack is the UDP storm attack [48]. -ICMP flooding attacks: an example of such attacks is the Ping flooding attack.…”
Section: Availability Issuesmentioning
confidence: 99%