scispace - formally typeset
J

Jelena Mirkovic

Researcher at Information Sciences Institute

Publications -  114
Citations -  5086

Jelena Mirkovic is an academic researcher from Information Sciences Institute. The author has contributed to research in topics: Denial-of-service attack & Computer science. The author has an hindex of 28, co-authored 89 publications receiving 4710 citations. Previous affiliations of Jelena Mirkovic include University of California, Los Angeles & University of Southern California.

Papers
More filters
Journal ArticleDOI

A taxonomy of DDoS attack and DDoS defense mechanisms

TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Proceedings ArticleDOI

Attacking DDoS at the source

TL;DR: D-WARD is proposed, a DDoS defense system deployed at source-end networks that autonomously detects and stops attacks originating from these networks that offers good service to legitimate traffic even during an attack, while effectively reducing DDoS traffic to a negligible level.
Proceedings ArticleDOI

SAVE: source address validity enforcement protocol

TL;DR: A new protocol is described, named SAVE, that can provide routers with the information needed for source address validation, and its correctness and performance are evaluated by simulation experiments.
Journal ArticleDOI

D-WARD: a source-end defense against flooding denial-of-service attacks

TL;DR: D-WARD is proposed, a source- end DDoS defense system that achieves autonomous attack detection and surgically accurate response, thanks to its novel traffic profiling techniques, the adaptive response and the source-end deployment.
Book

Internet denial of service : attack and defense mechanisms

TL;DR: In this article, the authors present an overview of DDoS Defenses, including recruitment of an Agent Network, recruitment of the Agent Network Controlling the DDoS Agent Network Semantic Levels of DoS Attacks Attack Toolkits What Is IP Spoofing? DDoS Attack Trends 5. Detailed Defense Approaches 6.