9,674
Views
15
CrossRef citations to date
0
Altmetric
Reviews

Denial of service attacks – an updated perspective

Pages 285-294 | Received 09 Mar 2016, Accepted 22 Sep 2016, Published online: 11 Oct 2016

Figures & data

Figure 1. Layers of the OSI reference model.

Figure 1. Layers of the OSI reference model.

Figure 2. Functions and protocols in the OSI reference model.

Figure 2. Functions and protocols in the OSI reference model.

Table 1. Most commonly exploited protocols at application layer.

Figure 3. Most common protocols targeted for application layer attacks.

Figure 3. Most common protocols targeted for application layer attacks.

Table 2. Most common tools used for DoS attacks at application layer.

Table 3. Most common tools used for DoS attacks at transport layer.

Table 4. Summary of DoS attacks.

Figure 4. Tools used to detect threats.

Figure 4. Tools used to detect threats.

Figure 5. Effectiveness of detection mechanisms.

Figure 5. Effectiveness of detection mechanisms.

Figure 6. DoS threat mitigation techniques.

Figure 6. DoS threat mitigation techniques.