Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions

作者: Nilesh Vishwasrao Patil , Krishan Kumar , C. Rama Krishna

DOI: 10.1002/CPE.6197

关键词:

摘要:

参考文章(63)
Xinlei Ma, Yonghong Chen, DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy IEEE Communications Letters. ,vol. 18, pp. 114- 117 ,(2014) , 10.1109/LCOMM.2013.112613.132275
Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita, Network Anomaly Detection: Methods, Systems and Tools IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 303- 336 ,(2014) , 10.1109/SURV.2013.052213.00046
Sajal Bhatia, Desmond Schmidt, George Mohay, Alan Tickle, A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events Computers & Security. ,vol. 40, pp. 95- 107 ,(2014) , 10.1016/J.COSE.2013.11.005
Jérôme Francois, Issam Aib, Raouf Boutaba, FireCol: a collaborative protection network for the detection of flooding DDoS attacks IEEE ACM Transactions on Networking. ,vol. 20, pp. 1828- 1841 ,(2012) , 10.1109/TNET.2012.2194508
Phurivit Sangkatsanee, Naruemon Wattanapongsakorn, Chalermpol Charnsripinyo, Practical real-time intrusion detection using machine learning approaches Computer Communications. ,vol. 34, pp. 2227- 2235 ,(2011) , 10.1016/J.COMCOM.2011.07.001
Guoxing Zhang, Shengming Jiang, Gang Wei, Quansheng Guan, A prediction-based detection algorithm against distributed denial-of-service attacks Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing Connecting the World Wirelessly - IWCMC '09. pp. 106- 110 ,(2009) , 10.1145/1582379.1582403
Mohammed A. Saleh, Azizah Abdul Manaf, A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks The Scientific World Journal. ,vol. 2015, pp. 238230- 238230 ,(2015) , 10.1155/2015/238230
Fei Wang, Hailong Wang, Xiaofeng Wang, Jinshu Su, A new multistage approach to detect subtle DDoS attacks Mathematical and Computer Modelling. ,vol. 55, pp. 198- 213 ,(2012) , 10.1016/J.MCM.2011.02.025