Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server

[1]  B. B. Gupta,et al.  An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach , 2012, ArXiv.

[2]  Bo Lang,et al.  Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey , 2019, Applied Sciences.

[3]  Geert Deconinck,et al.  Analyzing well-known countermeasures against distributed denial of service attacks , 2012, Comput. Commun..

[4]  Albert G. Greenberg,et al.  Data center TCP (DCTCP) , 2010, SIGCOMM '10.

[5]  V. Kamakshi Prasad,et al.  Detecting and Preventing IP-spoofed DDoS Attacks by Encrypted Marking Based Detection and Filtering (EMDAF) , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[6]  Songjie Wei,et al.  Benchmarks for DDOS Defense Evaluation , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[7]  Wu Zhijun,et al.  Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey , 2020, IEEE Access.

[8]  Martine Bellaïche,et al.  A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing , 2017, Future Internet.

[9]  Claes Wohlin,et al.  Experimentation in software engineering: an introduction , 2000 .

[10]  Sonia Fahmy,et al.  Towards user-centric metrics for denial-of-service measurement , 2007, ExpCS '07.

[11]  Marcello Cinque,et al.  Contextual filtering and prioritization of computer application logs for security situational awareness , 2020, Future Gener. Comput. Syst..

[12]  A. Pravin Renold,et al.  Distributed detection of flooding and gray hole attacks in Wireless Sensor Network , 2015, 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM).

[13]  Lukas Malina,et al.  On Detection and Mitigation of Slow Rate Denial of Service Attacks , 2019, 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).

[14]  Umberto Villano,et al.  Towards a Framework for Improving Experiments on DoS Attacks , 2020, QUATIC.

[15]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[16]  Neminath Hubballi,et al.  Slow rate denial of service attacks against HTTP/2 and detection , 2018, Comput. Secur..

[17]  Aamir Shahzad,et al.  Detecting flooding based DoS attack in cloud computing environment using covariance matrix approach , 2013, ICUIMC '13.

[18]  Sunny Behal,et al.  Characterization and comparison of Distributed Denial of Service attack tools , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[19]  Maurizio Mongelli,et al.  An on-line intrusion detection approach to identify low-rate DoS attacks , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).

[20]  Yang Xiao,et al.  A survey of distributed denial-of-service attack, prevention, and mitigation techniques , 2017, Int. J. Distributed Sens. Networks.

[21]  Cristina Conde,et al.  Detecting denial of service by modelling web-server behaviour , 2013, Comput. Electr. Eng..

[22]  Kiattikul Treseangrat,et al.  Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13 , 2015, 2015 International Conference on Computer, Information and Telecommunication Systems (CITS).

[23]  Santosh Biswas,et al.  Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization , 2014, International Journal of Machine Learning and Cybernetics.

[24]  Bokyoung Kang,et al.  Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A Sequential KNN Voting Approach , 2015, Int. J. Distributed Sens. Networks.

[25]  Panayiotis Kotzanikolaou,et al.  Evaluating security controls against HTTP-based DDoS attacks , 2013, IISA 2013.

[26]  Taghi M. Khoshgoftaar,et al.  Utilizing Netflow Data to Detect Slow Read Attacks , 2018, 2018 IEEE International Conference on Information Reuse and Integration (IRI).

[27]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.