scispace - formally typeset
Search or ask a question
Topic

DDoS mitigation

About: DDoS mitigation is a research topic. Over the lifetime, 237 publications have been published within this topic receiving 8082 citations.


Papers
More filters
Proceedings ArticleDOI
11 Mar 2018
TL;DR: In this article, the authors experimentally demonstrate, for the first time, DDoS mitigation of QKD-based networks utilizing a software defined network application, achieving successful quantum-secured link allocation after a DDoS attack based on realtime monitoring of quantum parameters.
Abstract: We experimentally demonstrate, for the first time, DDoS mitigation of QKD-based networks utilizing a software defined network application. Successful quantum-secured link allocation is achieved after a DDoS attack based on real-time monitoring of quantum parameters.

14 citations

Book ChapterDOI
01 Jan 2019
TL;DR: A novel mechanism to defend DDoS attacks at network layer and application layer based on IP traceback, which is capable of tracing IP packets to their sources without depending upon source address field of the IP header.
Abstract: Distributed Denial-of-Service (DDoS) attacks overwhelm the critical resources of a target server in order to reject its services to the legitimate clients and attack mainly on the availability in the Confidentiality Integrity Availability (CIA) triad in Internet-based applications. In this paper, we analyze three major components of DDoS defense mechanisms such as DDoS detection, DDoS mitigation, and IP traceback. In the first step, we need to detect all DDoS attacks using any intrusion detection system to pinpoint the exact packet characteristics of the attack. We classify the attack traffic based on packet characteristics. The classification can lead to mitigate an attack. Mitigation scheme uses rate limits and filters the malicious packets. IP traceback is capable of tracing IP packets to their sources without depending upon source address field of the IP header. IP traceback mechanisms are used to identify true source address and to refuse spoofed IP addresses. Finally, in this paper we proposed a novel mechanism to defend DDoS attacks at network layer and application layer.

13 citations

Posted Content
TL;DR: This work experimentally demonstrate, for the first time, DDoS mitigation of QKD-based networks utilizing a software defined network application and successful quantum-secured link allocation after a DDoS attack based on real-time monitoring of quantum parameters.
Abstract: We experimentally demonstrate, for the first time, DDoS mitigation of QKD-based networks utilizing a software defined network application. Successful quantum-secured link allocation is achieved after a DDoS attack based on real-time monitoring of quantum parameters

13 citations

Journal ArticleDOI
TL;DR: A filter-based defense mechanism, derived as an extension of the StopIt technique, which is able to face bandwidth flooding attacks and works on more realistic scenarios is proposed.

13 citations


Network Information
Related Topics (5)
Server
79.5K papers, 1.4M citations
85% related
Network packet
159.7K papers, 2.2M citations
84% related
Mobile computing
51.3K papers, 1M citations
84% related
Wireless ad hoc network
49K papers, 1.1M citations
83% related
Wireless network
122.5K papers, 2.1M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202119
202034
201932
201831
201728
201618