A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Authors
Keywords
-
Journal
International Journal of Distributed Sensor Networks
Volume 13, Issue 12, Pages 155014771774146
Publisher
SAGE Publications
Online
2017-12-13
DOI
10.1177/1550147717741463
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data
- (2017) Jian Shen et al. IEEE Transactions on Information Forensics and Security
- Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
- (2017) Zhangjie Fu et al. IEEE Transactions on Information Forensics and Security
- A survey of intrusion detection systems in smart grid
- (2017) Julius Jow et al. International Journal of Sensor Networks
- A secure cloud-assisted urban data sharing framework for ubiquitous-cities
- (2017) Jian Shen et al. Pervasive and Mobile Computing
- A distributed filtering mechanism against DDoS attacks: ScoreForCore
- (2016) Kübra Kalkan et al. Computer Networks
- A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking
- (2016) Shui Yu et al. IEEE TRANSACTIONS ON COMPUTERS
- Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
- (2016) Zhangjie Fu et al. IEEE Transactions on Information Forensics and Security
- A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
- (2016) Zhihua Xia et al. IEEE Transactions on Information Forensics and Security
- E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
- (2016) Monowar H. Bhuyan et al. Security and Communication Networks
- Election-based method for fault tolerance in a hierarchical sensor network (EFTOHSN): a case study of an indoor localisation system
- (2016) Mohamed Naili et al. International Journal of Sensor Networks
- DDoS attack protection in the era of cloud computing and Software-Defined Networking
- (2015) Bing Wang et al. Computer Networks
- Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
- (2015) Guang Yao et al. IEEE Transactions on Information Forensics and Security
- Fault-tolerant topology evolution and analysis of sensing systems in IoT based on complex networks
- (2015) Shuming Xiong et al. International Journal of Sensor Networks
- High performance simulation technology in the Internet of Things
- (2015) Buquan Liu International Journal of Sensor Networks
- A moving target DDoS defense mechanism
- (2014) Huangxin Wang et al. COMPUTER COMMUNICATIONS
- ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters
- (2014) S. Saurabh et al. COMPUTER COMMUNICATIONS
- DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy
- (2014) Xinlei Ma et al. IEEE COMMUNICATIONS LETTERS
- Cyber security in the Smart Grid: Survey and challenges
- (2013) Wenye Wang et al. Computer Networks
- A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
- (2013) Saman Taghavi Zargar et al. IEEE Communications Surveys and Tutorials
- Can We Beat DDoS Attacks in Clouds?
- (2013) Shui Yu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A transform domain-based anomaly detection approach to network-wide traffic
- (2013) Dingde Jiang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- NetFence
- (2012) Xin Liu et al. ACM SIGCOMM Computer Communication Review
- Cyber Security and Privacy Issues in Smart Grids
- (2012) Jing Liu et al. IEEE Communications Surveys and Tutorials
- Security and Privacy in Cloud Computing
- (2012) Zhifeng Xiao et al. IEEE Communications Surveys and Tutorials
- Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
- (2011) Yang Xiang et al. IEEE Transactions on Information Forensics and Security
- Security Challenges in the IP-based Internet of Things
- (2011) Tobias Heer et al. WIRELESS PERSONAL COMMUNICATIONS
- Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications
- (2009) Bo Sun et al. Ad Hoc Networks
- Flow-net methodology for accountability in wireless networks
- (2009) Yang Xiao IEEE NETWORK
- To filter or to authorize
- (2008) Xin Liu et al. ACM SIGCOMM Computer Communication Review
- Controlling IP Spoofing through Interdomain Packet Filters
- (2008) Zhenhai Duan et al. IEEE Transactions on Dependable and Secure Computing
- Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks
- (2008) Yang Xiang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Probabilistic Packet Marking for Large-Scale IP Traceback
- (2008) M.T. Goodrich IEEE-ACM TRANSACTIONS ON NETWORKING
- A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors
- (2008) Yi Xie et al. IEEE-ACM TRANSACTIONS ON NETWORKING
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now