A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic
[article]
2020
arXiv
pre-print
Overall, we discover 13.9 K IPv6 open resolvers that can be exploited for amplification DDoS attacks - 13 times more than previous work. ...
The absence of SAV for outgoing traffic has been known as a root cause of Distributed Denial-of-Service (DDoS) attacks and received widespread attention. ...
One of the most-recently discovered attacks, namely the NXNSAttack, can exploit open recursive resolvers in DDoS attacks to reach an amplification factor of up to 1620. ...
arXiv:2006.05277v1
fatcat:c5tgxuywozdqpl7atvwmjxrjae
Labelled Dataset on Distributed Denial-of-Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)
2022
Wireless Communications and Mobile Computing
The most dangerous attack against IPv6 networks today is a distributed denial-of-service (DDoS) attack using Internet Control Message Protocol version 6 (ICMPv6) messages. ...
The goal of this work is to create a comprehensive ICMPv6-DDoS attack dataset that can be used for tuning, benchmarking, and evaluating any detection systems designed to detect ICMPv6-DDoS attacks. ...
The variety of potential ICMPv6-DDoS attacks ensures the dependability of a detection model. Table 3 shows the different DDoS attack scenarios that were carried out. ...
doi:10.1155/2022/8060333
fatcat:dcv5uzlhhnadfm27dxnyeowcda
ICMPv6-based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A REVIEW
2020
IEEE Access
OPEN CHALLENGES This review gives an overall picture of the existing ML-based IDS models for the detection of ICMPv6-based DoS and DDoS attacks. ...
The potential of an ensemble framework using a parallel/distributed environment can be highly effective in the detection of DDoS attacks based on ICMPv6 messages, hence this area of research also needs ...
doi:10.1109/access.2020.3022963
fatcat:4ceado2idrh5zb7sxlw3q7denu
Adaptive response system for distributed denial-of-service attacks
2009
2009 IFIP/IEEE International Symposium on Integrated Network Management
of DDoS attacks. ...
Experiments on DARE show that the attack detection and mitigation were successfully completed within seconds, with about 60% to 86% of the attack traffic being dropped, while availability for legitimate ...
We also looked into the protection of next generation IPv6 networks from DDoS attacks. ...
doi:10.1109/inm.2009.5188887
dblp:conf/im/ThingSD09
fatcat:snsnw7mrangqrhlvbniorqorkq
DNSSEC and its potential for DDoS attacks
2014
Proceedings of the 2014 Conference on Internet Measurement Conference - IMC '14
However, a common argument against the deployment of DNSSEC is its potential for abuse in Distributed Denial of Service (DDoS) attacks, in particular reflection and amplification attacks. ...
The potential for abuse in DNSSEC-signed domains has, however, never been assessed on a large scale. In this paper we establish ground truth around this open question. ...
Additionally, we thank VeriSign for sharing data on .com and .net and the Public Interest Registry (PIR) for sharing data on .org. ...
doi:10.1145/2663716.2663731
dblp:conf/imc/Rijswijk-DeijSP14
fatcat:6f7qs7u6sbczpethybg2sbgrse
Moving Target Defense for Securing SCADA Communications
2018
IEEE Access
Another contribution is preventing black hole attacks and bandwidth depletion DDoS attacks through the use of extra paths between the peer hosts. ...
Improving privacy and anonymity for communicating hosts by removing permanent IP addresses from all packets is also one of the major contributions of this paper. ...
depletion Distributed Denial-of-Service (DDoS) attacks (that only need the subnet ID instead of the exact IPv6 address of a target). ...
doi:10.1109/access.2018.2844542
fatcat:kmgz5jbb4bdytkjw6u4yytzetq
Analyzing Enterprise DNS Traffic to Classify Assets and Track Cyber-Health
[article]
2022
arXiv
pre-print
Third, our method continuously tracks various health metrics across the organizational DNS assets and identifies several instances of improper configuration, data exfiltration, DDoS, and reflection attacks ...
for various asset types such as recursive resolvers, authoritative name servers, and mixed DNS servers. ...
We identified several instances of improper configurations, data exfiltration, DDoS, and reflection attacks. ...
arXiv:2201.07352v1
fatcat:jh2jf7wvzzgnjju7wbp7yoefni
Mirage: Towards Deployable DDoS Defense for Web Applications
[article]
2012
arXiv
pre-print
Distributed Denial of Service (DDoS) attacks form a serious threat to the security of Internet services. ...
Our approach is that end hosts can thwart the attackers by employing the principle of a moving target: end hosts in our architecture periodically change IP addresses to keep the attackers guessing. ...
ACKNOWLEDGMENTS We are grateful to Prateek Saxena and Devdatta Akhawe for discussions about our JavaScript mechanism. ...
arXiv:1110.1060v2
fatcat:ibjqxzgazrbhxmx3xiys6u5vlu
Security Threats in Software Defined Mobile Clouds (SDMC)
2016
Journal of Communications Software and Systems
Despite of increased smartphone usage, exploiting its full potential becomes very difficult owing to its typical issues such as resource scarcity, mobility and more prominently the security. ...
In the recent years, the rapid growth of smartphone business is highly evidenced due to its versatile usage irrespective of location, personality or context. ...
SDMC could utilize the following list of Open source tools for deployment of applications, services[ Table . II]. ...
doi:10.24138/jcomss.v12i2.81
fatcat:s74xa42ogjdwhg5jwvfw6jxel4
A Novel DDoS Floods Detection and Testing Approaches for Network Traffic based on Linux Techniques
2018
International Journal of Advanced Computer Science and Applications
Aggregation of data traffic flow will be considered from a point of impact on filtering productivity. This research work, is divided into following four parts: Firstly, the overview of the DDoS attack ...
flow of DDoS attacks. ...
On the side of the attacker, the DDoS attacks must be detected before it is launched by identifying precursors based on MIB. ...
doi:10.14569/ijacsa.2018.090248
fatcat:v6xtvojvabdutp2bq7chpg2n3a
Denial of service mitigation approach for IPv6-enabled smart object networks
2012
Concurrency and Computation
The aim of this paper is to provide a solution based on 6LowPAN neighbor discovery protocol to be supported only on edge routers to mitigate DoS and DDoS attack initiated from the Internet. ...
Denial of service mitigation approach for IPv6-enabled smart object networks. Concurrency and Computation: Practice and Experience. 25(1):129-142. Abstract. ...
para a Ciência e Tecnologia through the Pest-OE/EEI/LA0008/2011. ...
doi:10.1002/cpe.2850
fatcat:p44x6tctojdhfjv2dzu4j33spi
Carrier-Grade Anomaly Detection Using Time-to-Live Header Information
[article]
2016
arXiv
pre-print
A majority (69% IPv4; 81% IPv6) of passively observed multi-packet hosts exhibit one stable TTL value. ...
Active measurements on unstable hosts yield a stable anchor TTL value for more than 85% of responsive hosts. ...
Spoofed IP addresses are frequently used in so-called Distributed Denial of Service (DDoS) attacks. ...
arXiv:1606.07613v1
fatcat:fmdkknr7snaq7mj6wuetx72syi
Characterizing Optimal DNS Amplification Attacks and Effective Mitigation
[chapter]
2015
Lecture Notes in Computer Science
While practitioners have focused on reducing the number of open DNS resolvers, these efforts do not address the threat posed by authoritative DNS servers. ...
Attackers have used DNS amplification in over 34% of highvolume DDoS attacks, with some floods exceeding 300Gbps. ...
Introduction In 2013 and early 2014, attackers used DNS amplification in 34.9% of high volume DDoS attacks (those creating at least 20Gbps of attack traffic) and in 18.6% of all network DDoS attacks [ ...
doi:10.1007/978-3-319-15509-8_2
fatcat:vbu6ofqckbhbrlamw23tqzj2qa
The Impact on Security due to the Vulnerabilities Existing in the network a Strategic Approach towards Security
2017
International Journal of Advanced engineering Management and Science
This study is focused on the drawbacks of the existing technology and a fine grained introduction to Software Defined Networking. ...
Due to an exponential growth in the number of user and the amount of information over wires, there arises a great risk with the existing IP Network architecture. ...
On addressing the issues related to security, DDoS attacks will be in the limelight. ...
doi:10.24001/ijaems.3.5.18
fatcat:sanvr52wfzdarmx5msub7xezia
Mitigation against DDoS Attacks on an IoT-Based Production Line Using Machine Learning
2021
Applied Sciences
On the other hand, IoT integration opens the way for network cyberattacks. One possible cyberattack is the increasingly widely used distributed denial-of-service attack. ...
The emphasis was mainly on the integration of IoT devices, which could potentially be misused to run DDoS. ...
Future work will focus on analyzing the potential of such IPv6 networks during DDoS attacks on the production line.
Informed Consent Statement: Not applicable. ...
doi:10.3390/app11041847
fatcat:pr3la22us5bgjlyccmyropjzse
« Previous
Showing results 1 — 15 out of 411 results