44
Views
2
CrossRef citations to date
0
Altmetric
Articles

Detection of application layer DDoS attacks using big data technologies

, , &

References

  • D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, K. S. Ehlert, and D. Sisalem. “Survey of security vulnerabilities in session initiation protocol.” IEEE Communications Surveys & Tutorials 8.3(2006): 68-81. doi: 10.1109/COMST.2006.253270
  • M. Jensen, N. Gruschka, and R. Herkenhöner. “A survey of attacks on web services.” Computer Science-Research and Development 24.4 (2009): 185. doi: 10.1007/s00450-009-0092-6
  • S. T. Zargar, J. Joshi, and D. Tipper. “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks.” IEEE communications surveys & tutorials 15.4(2013):2046-2069. doi: 10.1109/SURV.2013.031413.00127
  • Khundrakpam Johnson Singh, and Tanmay De. “Mathematical modelling of DDoS attack and detection using correlation.” Journal of cyber security technology 1.3(2017):175–186. doi: 10.1080/23742917.2017.1384213
  • K. Singh, P. Singh, and K. Kumar. “Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges.” Computers & Security 65 (2017): 344-372. doi: 10.1016/j.cose.2016.10.005
  • A. Praseed, and P. S. Thilagam. “DDoS Attacks at the application layer: challenges and research perspectives for safeguarding web applications.” IEEE Communications Surveys & Tutorials 21.1(2018): 661-685. doi: 10.1109/COMST.2018.2870658
  • P. Joglekar, and N. Pise. “Solving cyber security challenges using big data.” International Journal of Computer Applications 154.4 (2016):9-12. doi: 10.5120/ijca2016912080
  • D. K. Bhattacharyya, and J. K. Kalita. “DDoS attacks: Evolution, detection, prevention, reaction, and tolerance.” 1stedn. Chapman and Hall/CRC (2016).
  • ZeifmanIgal. “Global DDoS threat landscape report.” https://www.imperva.com/blog/q4-2017-global-ddos-threat-landscape-report.
  • Parneet Kaur, Manish Kumar, and Abhinav Bhandari. “A review of detection approaches for distributed denial of service attacks.” Systems Science & Control Engineering 5.1 (2017):301–320. doi: 10.1080/21642583.2017.1331768
  • Gulshan Kumar. “Denial of service attacks – an updated perspective-Systems.” Science & Control Engineering 4 (2016): 285–294. doi: 10.1080/21642583.2016.1241193
  • Y. R. Bachupally, X. Yuan, and K. Roy. “Network security analysis using big data technology.” SoutheastCon, IEEE, Norfolk, VA, USA (2016): 1-4.
  • Y. Lee, and Y. Lee. “Detecting DDoS attacks with hadoop.” CoNEXT-student workshop, ACM, Tokyo, Japan, (2011): Article no. 7.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.