[HTML][HTML] DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges

LF Eliyan, R Di Pietro - Future Generation Computer Systems, 2021 - Elsevier
… -of-the-art solutions that address both DoS and DDoS attacks in SDNs through the … solutions.
Finally, we also highlight possible future research directions to address DoS/DDoS attacks

Toward an optimal solution against denial of service attacks in software defined networks

M Imran, MH Durad, FA Khan, A Derhab - Future Generation Computer …, 2019 - Elsevier
… Dillon and Berkelaar [32] proposed a method to identify and block the DDoS attacks in SDN.
… by temporarily blocking it. The third component blocks the whole traffic from malicious hosts. …

DDoS attack detection and mitigation using SDN: methods, practices, and solutions

NZ Bawany, JA Shamsi, K Salah - Arabian Journal for Science and …, 2017 - Springer
… Several Irish government websites were temporarily forced offline by an apparent DDoS
attack. The affected Web sites included Central Statistics Office, the Courts Service, the Health …

[HTML][HTML] A novel solution to handle DDOS attack in MANET

M Chhabra, B Gupta, A Almomani - 2013 - scirp.org
… Sometimes, however, a group of mobile devices form a spontaneous, temporary network as
they … This kind of spontaneous, temporary network referred to as mobile ad hoc networks (…

FastMove: Fast IP switching moving target defense to mitigate DDoS attacks

N Bandi, H Tajbakhsh, M Analoui - 2021 IEEE Conference on …, 2021 - ieeexplore.ieee.org
… an intelligent moving target solution against DDOS flooding attacks. Our solution will use
a … may disrupt a service provider’s services for a long time or temporarily. While network …

Distributed denial of service (DDoS) attacks detection mechanism

S Kumarasamy, R Asokan - arXiv preprint arXiv:1201.2007, 2012 - arxiv.org
… , and then normalize the data or build a temporary DB. Second, using a specific algorithm …
However, even though those methods can provide quite reasonable solutions to detect bad-…

Very short intermittent ddos attacks in an unsaturated system

H Shan, Q Wang, Q Yan - … Conference on Security and Privacy in …, 2017 - Springer
attacks which intend to temporarily saturate the bandwidth of network links that connect to
the target system, VSI-DDoS attacks … two more potential solutions to VSI-DDoS attacks: fine-…

[PDF][PDF] A survey of DDoS attacks and some DDoS defense mechanisms

P Zaroo - Advanced Information Assurance (CS 626), 2002 - users.cs.jmu.edu
… try to access a popular website leading to temporary unavailability of the site. Another term
for … (and a huge market for) solutions that mitigate the effect of a DDoS attack on a network. In …

A comprehensive categorization of DDoS attack and DDoS defense techniques

U Tariq, MP Hong, K Lhee - … Conference on Advanced Data Mining and …, 2006 - Springer
… of attack is Denial of Service (… DDoS attack results in $94,000 in damages due to lost
productivity. While some enterprises may have devised temporary solutions to specific DDoS attacks

Defeating DDoS attacks by fixing the incentive chain

Y Huang, X Geng, AB Whinston - ACM Transactions on internet …, 2007 - dl.acm.org
DDoS attacks cannot find effective methods to motivate them. In this article we discuss two
components of the technological solutions to DDoS attacks… , which is the temporary storage of …