Application Layer DDOS Attack Detection and Defense Methods
Author:
Sreenivasarao Sadhu
Publisher
Springer Singapore
Reference21 articles.
1. Dasari, K.B., Nagaraju, D.: Distributed denial of service attacks, tools and defense mechanisms. IJPAM 120(6), 3423–3437 (2018). ISSN: 1314-3395 2. Yu, J., Fang, C., Lu, L., Li, Z.: Mitigating application layer distributed denial of service attacks via effective trust management. IET Commun. 4(16). https://doi.org/10.1049/iet-com.2009.0809 3. Xu, C., Zhao, G., Xie, G., Yu, S.: Detection on application layer DDoS using random walk model. In: IEEE ICC 2014, Communication and Information Systems Security Symposium, pp. 707–712, Sydney, NSW, 10–14 June 2014 4. Lin, H., Cao, S., Wu, J., Cao, Z., Wang, F.: Identifying application-layer DDoS attacks based on request rhythm matrices. IEEE Access 7 (2019). https://doi.org/10.1109/ACCESS.2019.2950820 5. Xiang, Y., Li, K., Zhou, W.: Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE 6(2) (2011)
|
|