Survey of network-based defense mechanisms countering the DoS and DDoS problems
Citations
1,153 citations
971 citations
Cites methods from "Survey of network-based defense mec..."
...Methods /NIDSs /Tools Topics covered [8] [10] [11] [6] [16] [17] [3] [7] [21] [26] [29] [31] [32] [33] [34] Our survey...
[...]
...An extensive survey of DoS and distributed DoS attack detection techniques is presented in [26]....
[...]
669 citations
Cites background from "Survey of network-based defense mec..."
...SAVE protocol enables routers to update the information of expected source IP addresses on each link and block any IP packet with an unexpected source IP address [57]....
[...]
...Source Address Validity Enforcement (SAVE) protocol enables routers to update the information of expected source IP addresses on each link and block any IP packet with an unexpected source IP address [57]....
[...]
...The second group is called anomaly-based detection [57] (e....
[...]
366 citations
Cites background or methods from "Survey of network-based defense mec..."
...…in detail machine learning based data mining methods for intrusion detection, DoS defense and network wide anomaly detection, which have been previously surveyed in (Brugger, 2004; Lee and Stolfo, 2000; Stolfo et al., 2001; Mirkovic and Reiher, 2004; Peng et al., 2006; Lakhina et al., 2004, 2005)....
[...]
...Note that we do not attempt to provide a comprehensive survey of these attacks, which can be found in (Staniford, 2002; Weaver et al., 2003; Goldi and Hiestand, 2005; Peng et al., 2006; Mirkovic and Reiher, 2004; Igure and Williams, 2008)....
[...]
References
22,421 citations
"Survey of network-based defense mec..." refers background in this paper
...7The tragedy of the commons [Hardin 1968] happens when individuals try to maximize their bene.ts while ignoring the public interests....
[...]
...More importantly, similar problems, such as the tragedy of the commons7[Hardin 1968], have been solved through legislation....
[...]
7,390 citations
"Survey of network-based defense mec..." refers methods in this paper
...A Bloom .lter [Bloom 1970] is used to reduce the memory requirement to store packet records....
[...]
7,119 citations
6,198 citations
"Survey of network-based defense mec..." refers background in this paper
...In Lau et al. [2000] have shown that class-based queuing (CBQ) [Floyd and Jacobson 1995] algorithms can guarantee bandwidth for certain classes of input .ows, while Random Early Detection (RED) [Floyd and Jacobson 1993] performs poorly with regard to DDoS attacks....
[...]
5,482 citations