scispace - formally typeset
Proceedings ArticleDOI

A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis

Reads0
Chats0
TLDR
A cookie-based scheme to protect systems from DoS and DDoS attacks is extended and a novel queuing network model is adopted to analyze this scheme by estimating two essential metrics, i.e. the mean total response time and the mean queue length of MAP.
Citations
More filters
Journal ArticleDOI

Secure Monitoring of Patients With Wandering Behavior in Hospital Environments

TL;DR: A security application for an SDN controller that can be used to enforce fine granular policies for communication between the hosts, real time location tracking of the patients, and deal with attacks on the hospital networks is developed.
Proceedings ArticleDOI

Security Techniques for Beyond 3G Wireless Mobile Networks

TL;DR: A security architecture for counteracting denial of service attacks in Beyond 3G (B3G) network architecture with mobile nodes is proposed and has distinct advantages such as monitoring of the traffic to the victim node and the attack traffic being dropped before reaching the victim.
Journal ArticleDOI

Security Techniques for Counteracting Attacks in Mobile Healthcare Services.

TL;DR: Techniques for counteracting denial of service attacks on mobile devices that are providing the user's health related information and for securing the communication between mobile nodes and healthcare service providers on the Internet are proposed.
Proceedings ArticleDOI

Counteracting DDoS attacks in WLAN

TL;DR: It is described how mobile IP protocol in conjunction with the model can be used to deal efficiently with the attacks on mobile nodes to counteracting denial of service attacks in wireless based network architecture with mobile nodes.
Journal ArticleDOI

Securing wireless mobile nodes from distributed denial-of-service attacks

TL;DR: This paper proposes techniques to counteract distributed denial‐of‐service attacks on wireless mobile devices and describes the operation and architectural components of the model that is able to efficiently deal with the attacks.
References
More filters
Journal ArticleDOI

A taxonomy of DDoS attack and DDoS defense mechanisms

TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Proceedings ArticleDOI

Advanced and authenticated marking schemes for IP traceback

TL;DR: Two new schemes are presented, the advanced marking scheme and the authenticated marking scheme, which allow the victim to trace-back the approximate origin of spoofed IP packets and provide efficient authentication of routers' markings such that even a compromised router cannot forge or tamper markings from other uncompromised routers.
Journal ArticleDOI

DDoS defense by offense

TL;DR: This paper presents the design, implementation, analysis, and experimental evaluation of speak-up, a defense against application-level distributed denial-of-service (DDoS), in which attackers cripple a server by sending legitimate-looking requests that consume computational resources.
Journal ArticleDOI

Sustaining availability of Web services under distributed denial of service attacks

TL;DR: A practical DDoS defense system that can protect the availability of web services during severe DDoS attacks and is evaluated based on a novel game theoretical framework, which characterizes the natural adversarial relationship between a DDoS adversary and the proposed system.
Related Papers (5)