Skip to main content
Log in

A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development

  • 1205: Emerging Technologies for Information Hiding and Forensics in Multimedia Systems
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made it a destructive weapon of attackers which can disrupt the services of any network including the Internet of Things. It is almost impossible to avoid DDoS attacks completely but still these attacks can be handled efficiently. It is a core security issue as these attacks can cause financial loss to organizations. So, it is necessary to know DoS/DDoS attack types and their solutions. This paper reviews major known DoS/DDoS attacks, attack tools, their prevention, detection, and traceback techniques. Solutions include techniques like filtering, honeypots, signature & anomaly-based detection, Link testing, Packet marking, and many more are reviewed in this paper. A proper analysis of these attacks and solutions is necessary for new strategy formation. This paper is beneficial for researchers and professionals working in this area to understand these attacks and see the latest scenarios. Areas that require more concentration can be identified and by working on them, a more secure working environment can be provided to end-users and organizations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Adler M (2002) Tradeoffs in probabilistic packet marking for IP traceback. In: Proceedings of the 34th ACM Symposium Theory of Computing (STOC), Montreal, Quebec, Canada, May 19-21, pp. 407–418

  2. Ahmed Z, Afaqui N, Humayan O (2019) Detection and prevention of DDoS attacks on software defined networks controllers for smart grid. International Journal of Computer Applications 975:8887

    Google Scholar 

  3. Ahmim A, Maglaras L, Ferrag MA, Derdour M, Janicke H (2019) A novel hierarchical intrusion detection system based on decision tree and rules-based models, 2019 15th international conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island, Greece, pp 228–233

  4. Ahuja N, Singal G (2019) DDOS Attack Detection & Prevention in SDN using OpenFlow Statistics, 2019 IEEE 9th International Conference on Advanced Computing (IACC), Tiruchirappalli, India, 147–152

  5. Aldaej A (2019) Enhancing Cyber Security in Modern Internet of things (IoT) Using Intrusion Prevention Algorithm for IoT (IPAI). In: IEEE Access, https://doi.org/10.1109/ACCESS.2019.2893445

  6. Al-Duwairi B, Özkasap Ö, Uysal A, Kocaoǧullar C, Yldirim K (2020) LogDoS: ANovel Logging-based DDos Prevention Mechanism in Path Identifier-Based Information Centric Networks. Computers & Security, p 102071

  7. AlEroud A, Karabatis G (2013) A System for Cyber Attack Detection Using Contextual Semantics. 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 431–442. https://doi.org/10.1007/978-3-642-30867-3-39

  8. AlOmary RY, Khan SA (2014) Fuzzy logic based multi-criteria decision-making using Dubois and Prade’s operator for distributed denial of service attacks in wireless sensor networks. 2014 5th International Conference on Information and Communication Systems (ICICS). https://doi.org/10.1109/iacs.2014.6841979

  9. Ali A, Yousaf MM (2020) Novel Three-Tier Intrusion Detection and Prevention System in Software Defined Network,” in IEEE Access, vol. 8, pp 109662–109676

  10. Alnakhalny R, Manickam S, Ramadass S (2013) Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 network: Review & Analysis. ACEEE International Journal on Network Security 4:35–39

    Google Scholar 

  11. Alomari E, Manickam S, B. Gupta B, Karuppayah S, Alfaris R (2012) Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers. Classification and Art. International Journal of Computer Applications 49 (7):24–32. https://doi.org/10.5120/7640-0724

    Article  Google Scholar 

  12. Alsaadi HIH, ALmuttari RM, Ucan ON, Bayat O (2021) An adapting soft computing model for intrusion detection system. Computational Intelligence. 1–21

  13. Ambwani T (2003) Multi class support vector machine implementation to intrusion detection. In: Proceedings of the International Joint Conference on Neural Networks, vol. 3, pp 2300–2305

  14. Amin SO, Hong CS, Kim KY (2006) Tracing the True Source of an IPv6 Datagram Using Policy Based Management System. In: Proceedings of the Management of Convergence Networks and Services. Springer; 263-272

  15. Amin R, Islam SH, Biswas GP, et al. (2015) An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. J Med Syst 39:180

    Article  Google Scholar 

  16. Anagnostopoulos M, Kambourakis G, Kopanos P, Louloudakis G, Gritzalis S (2013) DNS amplification attack revisited. Computers & Security 39:475–485. https://doi.org/10.1016/j.cose.2013.10.001

    Article  Google Scholar 

  17. Andrysiak T, Saganowski ? (2016) DDoS attacks detection by means of statistical models. Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015 (pp. 797–806). Wroclaw, Poland: Springer

  18. Aroua MK, Zouari B (2012) A distributed and coordinated massive DDOS attack detection and response approach, 2012 IEEE 36th annual computer software and applications conference Workshops, Izmir, pp 230–235

  19. Aura T, Nikander P, Leiwo J (2000) DoS-resistant authentication with client puzzles. In: Proceedings of the 8th International Workshop on Security Protocols. Springer, New York, pp 170–177

  20. Baba T, Matsuda S (2002) Tracing network attacks to their sources. IEEE internet computing, March/April 2002, 20–26

  21. Baecher P, Koetter M, Dornseif M, Freiling F (2006) The nepenthes platform: An efficient approach to collect malware. Inproceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID) (pp 165–184), Berlin, Springer

  22. Bahal S, Kumar K (2017) Characterization and Comparison of DDoS Attack Tools and Traffic Generators - A Review, International Journal of Network Security, Vol.19, No.3, PP. 383–393, May (https://doi.org/10.6633/IJNS.201703.19(3).07)

  23. Baig ZA, Salah K (2010) Multi-agent pattern recognition mechanism for detecting distributed denial of service attacks. IET information security 4(4):333–343

    Article  Google Scholar 

  24. Baskar M, Gnanasekaran T, Vijay JF (2018) Time variant predicate based traffic approximation algorithm for efficient low rate DDoS attack detection

  25. Bellovin SM, Leech M, Taylor T (2003) ICMP traceback messages

  26. Besharati E, Naderan M, Namjoo E (2019) LR-HIDS:, logistic regression host-based intrusion detection system for cloud environments. J Ambient Intell Human Comput 10:3669–3692

    Article  Google Scholar 

  27. Bhattacharyya DK, Kalita JK (2016) DDos attacks: evolution, detection, prevention, reaction, and tolerance CRC Press

  28. Bhavani Y, Janaki V, Sridevi R (2020) IP Traceback Through Modified Probabilistic Packet Marking Algorithm Using Record Route. Proceedings of the Third International Conference on Computational Intelligence and Informatics, Advances in Intelligent Systems and Computing 1090, https://doi.org/10.1007/978-981-15-1480-7-40

  29. Bhuyan MH, Bhattacharyya D, Kalita JK (2015) An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn Lett 51:1–7. https://doi.org/10.1016/j.patrec.2014.07.019

    Article  Google Scholar 

  30. Bhuyan MH, Kashyap HJ, Bhattacharyya DK, Kalita JK (2013) Detecting distributed denial of service attacks: Methods, tools and future directions. The Computer Journal 57:537–556

    Article  Google Scholar 

  31. Bijalwan A, Wazid M, Pilli E, Joshi R (2015) Forensics of Random-UDP Flooding Attacks. Journal of Networks. 10, pp 287–293

  32. Bista S, Chitrakar R (2018) DDoS attack detection using heuristics clustering algorithm and naïve bayes classification

  33. Bouyeddou B, Kadri B, Harrou F, Sun Y (2020) DDOS-attacks detection using an efficient measurement-based statistical mechanism. Engineering Science and Technology, an international Journal 23(4):870–878

    Article  Google Scholar 

  34. Braden R et al (1994) Integrated Services in the Internet Architecture: an overview. RFC 1633:1–33

    Google Scholar 

  35. Brustoloni J (2002) Protecting electronic commerce from Distributed Denial of Service attacks. In: Proceedings of the 11th international world wide web conference, ACM, Honolulu, HI, 553–561

  36. Burch H, Cheswich B (2000) Tracing Anonymous Packets to Their Approximate Source. In: Proceedings of the USENIX conference on System administration. 319-328

  37. Bush Stephen F (2010) Nanoscale Communication Networks [Book]. [s.l.] : ARTECH HOUSE, 685 Canton Street, Norwood, MA, 02062

  38. Çakmakç SD, Hutschenreuter H, Maeder C, Kemmerich T (2021) A framework for intelligent DDoS attack detection and response using SIEM and ontology, 2021 IEEE International Conference on Communications Workshops (ICC Workshops), 1–6

  39. Cannady J (1998) Artificial neural networks for misuse detection. Proc. 1998 Nat. Inf. Syst. Secur. Conf., pp 443–456

  40. Casas P, Mazel J, Owezarski P (2012) Unsupervised network intrusion detection systems: Detecting the unknown without knowledge. Comput Commun 35(7):772–783

    Article  Google Scholar 

  41. Ceron JM, Scholten C, Pras A, Santanna J (2020) Mikrotik Devices Landscape, Realistic Honeypots, and Automated Attack Classification. NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, pp 1–9

  42. Cerroni W, Moro G, Pasolini R, Ramilli M (2015) Decentralized detection of network attacks through P2P data clustering of SNMP data. Computers & Security 52:1–16

    Article  Google Scholar 

  43. Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers & Electrical Engineering 69:534–554

    Article  Google Scholar 

  44. Chan G-Y, Lee C-S, Heng S-H (2013) Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. J Netw Comput Appl 36(2):829–842

    Article  Google Scholar 

  45. Chen EY (2001) AEGIS: An Active-network-powered defense mechanism against DDos attacks. In: Proceedings of the Third International Working Conference on Active Networks (IWAN 2001), Lecture Notes in Computer Science, vol 2207. Springer, Berlin, pp 1–15

  46. Chen C-L (2009) A new detection method for distributed denial-of-service attack traffic based on statistical test. Journal of Universal Computer Science 15:488–504

    Google Scholar 

  47. Chen Y, Hwang K (2006) Collaborative change detection of DDoS attacks on community and ISP networks. Collaborative technologies and systems. 2006. CTS, International Symposium on (pp. 401–410). IEEE Las Vegas, NV, USA

  48. Chung CY, Gertz M, Levitt K (2000) DEMIDS: A Misuse Detection System for Database Systems. In: Van Biene-Hershey ME, Strous L (eds) Integrity and Internal Control in Information Systems. IICIS 1999. IFIP - The International Federation for Information Processing, vol 37. Springer, Boston, MA, DOI https://doi.org/10.1007/978-0-387-35501-6-12

  49. Daimi K (ed) (2018) Computer and Network Security Essentials. Springer International Publishing AG, Berlin

    Google Scholar 

  50. Damon E, Dale J, Laron E, Mache J, Land N, Weiss R (2012) Hands-on denial of service lab exercises using SlowLoris and RUDY. Proceedings of the 2012 Information Security Curriculum Development Conference on - InfoSecCD ’12. https://doi.org/10.1145/2390317.2390321

  51. Dao N, Vu D, Lee Y, Park M, Cho S (2018) MAEC-x: DDos prevention leveraging multi-access edge computing, 2018 International Conference on Information Networking (ICOIN), Chiang Mai, pp 245–248

  52. Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJPC (2018) Biometrics-Based Privacy-Preserving User authentication scheme for Cloud-Based industrial internet of things deployment. IEEE Internet Things J. 5(6):4900–4913

    Article  Google Scholar 

  53. Dean D, Franklin M, Stubblefield A (2002) An algebraic approach to IP traceback. ACM Trans Inf Syst Secur 5(2):119–137

    Article  Google Scholar 

  54. Dekeris B, Adomkus T, Budnikas A (2006) Analysis of qos assurance using weighted fair queueing (WQF) scheduling discipline with low latency queue (LLQ) 28th International Conference on Information Technology Interfaces

  55. Dong S, Jain R, Abbas KA (2019) Survey on Distributed Denial of Service (DDos) Attacks in SDN and Cloud Computing Environments. IEEE Access, 1–1

  56. Dorigo M, Maniezzo V, Colorni A (1991) The ant system: An autocatalytic optimizing process. Technical Report No. 91-016 Revised, Politecnico di Milano, Italy

  57. Elhag S, Fern’andez A, Bawakid A, Alshomrani S, Herrera F (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42(1):193–202

    Article  Google Scholar 

  58. Enigo VSF, Ganesh KT, Raj NNV, Sandeep D (2020) Hybrid Intrusion Detection System for Detecting New Attacks Using Machine Learning, 2020 5th International Conference on Communication and Electronics Systems (ICCES), COIMBATORE, India, pp 567–572

  59. Estan C, Varghese G (2002) New directions in traffic measurement and accounting. Pittsburgh, Pennsylvania, USA: ACM. Wang, H., Zhang, D., & Shin, K G, 2002

  60. Fadlallah A, Serhrouchni A, Begriche Y, Nait-Abdesselam F (2008) A Hybrid Messaging-Based Scheme for IP Traceback. 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications

  61. Feinstein L, Schnackenberg D, Balupari R, Kindred D (2003) Statistical approaches to DDos attack detection and response. Proceedings DARPA Information Survivability Conference and Exposition, Washington, DC, USA 1:303–314. https://doi.org/10.1109/DISCEX.2003.1194894

    Article  Google Scholar 

  62. Ferguson P, Senie D (1998) Network ingress filtering: Defeating denial of ser-vice attacks which employ IP source address spoofing, RFC 2267 the Internet Engineering Task Force (IETF)

  63. Forouzan BA (2003) Data Communications and Networking (3rd. ed.) McGraw-Hill, Inc. USA

  64. Fortunati S, Gini F, Greco MS, Farina A, Graziano A, Giompapa S (2016) An improvement of the state of the art covariance based methods for statistical anomaly detection algorithms. SIViP 10:687–694. https://doi.org/10.1007/s11760-015-0796-y

    Article  Google Scholar 

  65. Fossaceca JM, Mazzuchi TA, Sarkani S (2014) MARK-ELM: Application Of a novel multiple kernel learning framework for improving the robustness of network intrusion detection, Expert Systems with Applications

  66. Francois J, AIB I, Boutaba R (2012) FireCol: A collaborative protection network for the detection of flooding DDoS attacks. IEEE/ACM Transactions on Networking (TON) 20:1828–1841. https://doi.org/10.1109/TNET.2012.2194508

    Article  Google Scholar 

  67. Garg A, Reddy ALN (2002) Mitigating Denial of service Attacks using QoS regulation. In: Proceedings of the Tenth IEEE International Workshop on Quality of Service, pp 45–53

  68. Gasti P, Tsudik G, Uzun E, Zhang L (2013) DoS and DDoS in Named Data Networking. 2013 22nd International Conference on Computer Communication and Networks (ICCCN)

  69. Gavrilis D, Dermatas E (2005) Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Computer Networks and ISDN Systems, 48 pages-235–245

  70. Gil MT, Poletto M (2001) MULTOPS: a data structure for bandwidth attack detection. Proceedings of the 10th conference on USENIX Security Symposium - Volume 10, Berkeley, CA, USA 13-17 August 3 USENIX Association Berkeley

  71. Gilad Y, A. Herzberg A (2012) LOT: A defense against IP spoofing and flooding attacks, ACM Transaction on Information. Systems. Se 15:

  72. Gong C, Saraç K (2008) A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking. IEEE Transactions on Parallel and Distributed Systems 19(10):1310–1324

    Article  Google Scholar 

  73. Gonzalez O, Shrikumar H, Stankovic JA, Ramamritham K (1997) Adaptive Fault Tolerance and Graceful Degradation Under Dynamic Hard Real-time Scheduling. Computer Science Department Faculty Publication Series. 188

  74. Gopi R, Sathiyamoorthi V, Selvakumar S, et al. (2021) Enhanced method of ANN based model for detection of DDos attacks on multimedia internet of things Multimed Tools Appl

  75. Gulisano V, Callau-Zori M, Fu Z, Jimenez-Peris R, Papatriantafilou M, Patiño-Martínez M (2015) STONE: A streaming DDoS defense framework. Expert Syst Appl 42:9620–9633. https://doi.org/10.1016/j.eswa.2015.07.027

    Article  Google Scholar 

  76. Haider S, Akhunzada A, Mustafa I, Patel TB, Fernandez A, Choo K-KR, Iqbal JA (2020) Deep CNN Ensemble Framework for Efficient DDos Attack Detection in Software Defined Networks. IEEE Access, 1–1

  77. Hamedi-Hamzehkolaie M, Shamani MJ, Ghaznavi-Ghoushchi MB (2012) Low rate DOS traceback based on sum of flows. In: Proceedings of the International Symposium on Telecommunications. 1142-1146. Page 26 of 41

  78. Hancock B (2000) Canadian teen mafiaboy pleads guilty. Computers & Security 19(8):669. https://doi.org/10.1016/s0167-4048(00)08007-x

    Article  Google Scholar 

  79. Hauben M (n.d.) (2007) History of ARPANET. http://www.dei.isep.ipp.pt/acc/docs/arpa.html, Accessed 30 November

  80. He D, Kumar N, Lee J (2016) Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Netw 22:491–502

    Article  Google Scholar 

  81. He D, Ma M, Zeadally S, Kumar N, Liang K (2018) Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Transactions on Industrial Informatics 14(8):3618–3627

    Article  Google Scholar 

  82. Heinanen J, Baker F, Weiss W, Wroclawski J (1999) Assured forwarding PHB group. Request for Comments (Proposed Standard) 2597. Internet engineering task force, June

  83. Hoque N, Bhattacharyya DK, Kalita JK (2016) FFSc: A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis. Security and Communication Networks 9:2032–2041

    Google Scholar 

  84. Hoque N, Kashyap H, Bhattacharyya DK (2017) Real-time DDoS attack detection using FPGA. Comput Commun 110:48–58. https://doi.org/10.1016/j.comcom.2017.05.015

    Article  Google Scholar 

  85. Horng S-J, Su M-Y, Chen Y-H, Kao T-W, Chen R-J, Lai J-L, Perkasa CD (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert systems with Applications 38(1):306–313

    Article  Google Scholar 

  86. Hu J, Yu X, Qiu D, Chen H-H (2009) A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection. IEEE Netw 23(1):42–47

    Article  Google Scholar 

  87. Hussain B, Du Q, Sun B, Han Z (2020) Deep Learning-Based DDos-attack Detection for Cyber-Physical System over 5G network. IEEE Transactions on Industrial Informatics, 1–1

  88. Introduction to Intrusion Detection Systems (2003) Cisco Security Professional’s Guide to Secure Intrusion Detection Systems, 1-38

  89. Ioannidis J, Bellovin SM (2002) Implementing pushback: router-based defense against DDoS Attacks. In: Proceedings of Network and Distributed System Security Symposium, NDSS-02. CA, San Diego, pp 6–8

  90. Izaddoost A, Othman M, Rasid MFA (2007) Accurate ICMP traceback model under DoS/DDoS attack. In: Proceedings of the international conference on advanced computing and communications, 2007 (ADCOM 2007), Guwahati, India, 18-21 December, pp. 441–446. New York: IEEE

  91. Jacobson V, Nichols K, Poduri K (1999) An expedited forwarding PHB. Request for Comments (Proposed Standard) 2598 Internet Engineering Task Force, June

  92. Jalili R, Imani-Mehr F, Amini M, Shahriari HR (2005) Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. Lect Notes Comput Sci, pp 192–203

  93. Jamader AR, Das P, Acharya BR (2019) “Bciot: Blockchain based DDos prevention architecture for IoT,” 2019 International Conference on Intelligent Computing and Control Systems (ICCS), Madurai, India, pp 377–382

  94. Jamali S, Shaker V (2014) Defense against SYN flooding attacks: a particle swarm optimization approach. Computers & Electrical Engineering 40 (6):2013–2025

    Article  Google Scholar 

  95. Jan N-Y, Lin S-C, Tseng S-S, Lin NP (2009) A decision support system for constructing an alert classification model. Expert Syst Appl 36(8):11 145–11 155

    Article  Google Scholar 

  96. Jelodar H, Aramideh J (2014) Presenting a pattern for detection of denial of service attacks with web mining technique and fuzzy logic approach, 2014 International Conference on Control, Instrumentation Communication and Computational Technologies (ICCICCT), pp 156–160

  97. Jiang X, Xu D, Wang Y-M (2006) Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention. Journal of Parallel and Distributed Computing 66(9):1165–1180. https://doi.org/10.1016/j.jpdc.2006.04.012

    Article  MATH  Google Scholar 

  98. Jin C, Wang H, Shin KG (2003) Hop-count filtering. Proceedings of the 10th ACM Conference on Computer and Communication Security - CCS ’03

  99. Juels A, Brainard J (1999) Client puzzles: a cryptographic countermeasure against connection depletion attacks. In: Proceedings of NDSS -99 (Networks and Distributed Security Systems), San Diego, CA, USA, February, Internet Society, pp 151–165

  100. Kalkan K, Gur G, Alagoz F (2017) Filtering-Based Defense Mechanisms Against DDoS Attacks:, A Survey. IEEE Syst J 11(4):2761–2773

    Article  Google Scholar 

  101. Kantardzic M (2020) Data Mining concepts, Models, Methods, and Algorithms. Wiley-IEEE Press

  102. Karami A, Guerrero-Zapata M (2015) A hybrid multi objective RBFPSO method for mitigating DoS attacks in named data networking. Neurocomputing 151:1262–1282

    Article  Google Scholar 

  103. Kargl F, Maier J, Weber M (2001) Protecting web servers from distributed denial of service attacks. In: Proceedings of the tenth international conference on world wide web, Hong Kong, May 1-5, pp 514–524

  104. Karimazad R, Faraahi AA (2011) An anomalybased method for DDoS attacks detection using rbf neural networks. Proceedings of the international conference on network and electronics engineering, Singapore, pp. 44–48 IACSIT Press

  105. Kaur Chahal J, Bhandari A, Behal S (2019) Distributed Denial of Service Attacks: A Threat or Challenge. New Review of Information Networking 24(1):31–103

    Article  Google Scholar 

  106. Kemmerer RA, Vigna G (2002) Intrusion detection: a brief history and overview. Computer, 35(4), supl27-supl30

  107. Keromytis AD, Misra V, Rubenstein D (2004) SoS: An Architecture for Mitigating DDoS Attacks. IEEE Journal on Selected Areas in Communications

  108. Khajuria A, Srivastava R (2013) Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic. International Journal of Enhanced Research in Management & Computer Applications, ISSN: 2319-7471 Vol. 2 Issue 5, May, pp: (37–42), Available online at: www.erpublications.com

  109. Khajuria A, Srivastava R (2013) Knowledge Based System for Detection and Prevention of DDos Attacks using Fuzzy logic

  110. Khattab SM, Sangpachatanaruk C, Melhem R, Mosse D, Znati T (2003) Proactive server roaming for mitigating denial of service attacks. In: Proceedings of the 1st international conference on International Technology: Research and Education (ITRE), 03, Newark, NJ, 500–504

  111. Kim HG, Kim DJ, Cho SJ, Park M, Park M (2011) An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots. In: Proceedings of the 2011 ACM Symposium on Research in Applied Computation (pp. 266–271). New York: ACM

  112. Koay A, Chen A, Welch I, Seah WK (2018) A new multi classifier system using entropy based features in DDoS attack detection. 2018 International Conference on Information Networking (ICOIN) (pp. 162–167). IEEE, Chiang Mai, Thailand

  113. Krasnov AE, Nadezhdin EN, Galayev VS, Zykova EA, Nikol’skii DN, Repin DS (2018) DDoS attack detection based on network traffic phase coordinates analysis. Int J Appl Eng Res 13:5647–5654

    Google Scholar 

  114. Kshirsagar D, Rathod A, Wathore S (2016) Performance analysis of DoS LAND attack detection. Perspectives in Science 8:736–738. https://doi.org/10.1016/j.pisc.2016.06.074

    Article  Google Scholar 

  115. Kumar S (2007) Smurf-based Distributed Denial of Service (DDos) Attack Amplification in Internet, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), San Jose, CA. pp 25–25

  116. Kumar KPK, Geethakumari G (2014) Analysis of semantic attacks in online social networks. In: Martínez Pérez G, Thampi SM, Ko R, Shu L (eds) Recent trends in computer networks and distributed systems security. SNDS 2014. Communications in computer and information science, vol 420. Springer, Berlin, Heidelberg, DOI https://doi.org/10.1007/978-3-642-54525-2-4

  117. Kumar N, Iqbal R, Misra S, Rodrigues JJPC (2015) Bayesian coalition game for Contention-Aware reliable data forwarding in vehicular mobile cloud. Futur Gener Comput Syst 48:60–72

    Article  Google Scholar 

  118. Kumar V, Sangwan DOP (2012) Signature based intrusion detection system using SNORT. Int. J. Comput. Appl. Inf. Technol. 1(3):35–41

    Google Scholar 

  119. Kumar P, Selvakumar S (2011) Distributed denial of service attack detection using an ensemble of neural classifier. Computer Communication 34:1328–1341

    Article  Google Scholar 

  120. Kumar M, Singh AK (2020) Distributed Intrusion Detection System using Blockchain and Cloud Computing Infrastructure, 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), Tirunelveli, India, pp 248–252

  121. Kumar S, Spafford EH (1994) A Pattern Matching Model for Misuse Intrusion Detection. Department of Computer Science Technical Reports. Paper 1170. https://docs.lib.purdue.edu/cstech/1170

  122. Lakhina A, Crovella M, Diot C (2005) Mining anomalies using traffic feature distributions. ACM SIGCOMM Computer Communication Review (pp. 217–228). New York, NY, United States: ACM

  123. Le A, Al-Shaer E, Boutaba R (2008) On optimizing load balancing of intrusion detection and prevention systems. IEEE INFOCOM Workshops 2008, Phoenix, AZ, pp 1–6

  124. Lee T-H, Chang L-H, Syu C-W (2020) Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks. IEEE International Conference on Communications Workshops (ICC Workshops), 2020

  125. Lee S, Kim G, Kim S (2011) Self-adaptive and dynamic clustering for online anomaly detection. Expert Syst Appl 38(12):14 891–14 898

    Article  Google Scholar 

  126. Lee K, Kim J, Kwon KH, Han Y, Kim S (2008) DDOs attack detection method using cluster analysis. Expert Syst Appl 34(3):1659–1665

    Article  Google Scholar 

  127. Lee SM, Kim DS, Lee JH, Park JS (2012) Detection of DDos attacks using optimized traffic matrix. Computers & Mathematics with Applications 63 (2):501–510

    Article  Google Scholar 

  128. Lee W, Park K (2001) On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. Proceedings of the IEEE INFOCOM01, anchorage, AK, USA, 2001

  129. Lee HC, Thing VL, Xu Y et al (2003) ICMP traceback with cumulative path, an efficient solution for IP traceback. In: Proceedings of the international conference on information and communications security, Huhehaote, China, 10-13 October, pp.124–135. Berlin; Heidelberg: Springer

  130. Li Y, Xia J, Zhang S, Yan J, Ai X, Dai K (2012) An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst Appl 39(1):424–430

    Article  Google Scholar 

  131. Limwiwatkul L, Rungsawang A (2004) A Distributed denial of service detection using TCP/IP header and traffic measurement analysis. Proceedings of the IEEE International symposium communications and information technology, Sapporo, Japan, 26-29 October, pp. 605–610 IEEE CS

  132. Lin C-H, Lin H-Y, Wu T-W, Chen Y-H, Huang C-H (2011) Preserving quality of service for normal users against DDoS attacks by using Double Check Priority Queues. Journal of Ambient Intelligence and Humanized Computing 4 (2):275–282

    Article  Google Scholar 

  133. Liu Z, Cao Y, Zhu M, Ge W (2019) Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services. In: IEEE Transactions on Information Forensics and Security, vol 14, pp 1098–1108, DOI https://doi.org/10.1109/TIFS.2018.2870828

  134. Loukas G, Oke G (2009) Protection against Denial of Service Attacks:, A Survey. The Computer Journal 53(7):1020–1037

    Article  Google Scholar 

  135. Ma X, Chen Y (2014) DDoS detection method based on chaos analysis of network traffic entropy. IEEE Commun Lett 18:114–117. https://doi.org/10.1109/LCOMM.2013.112613.132275

    Article  Google Scholar 

  136. Mahajan R, Bellovin SM, Floyd S, Ioannidis J, Paxson V, Shenker S (2002) Aggregate congestion control. ACM SIGCOMM Computer Communication Review 32(1):69

    Article  Google Scholar 

  137. Mahajan D, Sachdeva M (2013) DDoS Attack Prevention and Mitigation Techniques-A Review. International Journal of Computer Applications 67(19):21–24. Published by Foundation of Computer Science, USA

    Article  Google Scholar 

  138. Mahjabin T, Xiao Y, Sun G, Jiang W (2017) A survey of distributed denial-of-service attack, prevention, and mitigation techniques. International Journal of Distributed Sensor Networks 13 (12):155014771774146

    Article  Google Scholar 

  139. Malliga S, Kogilavani SV, Nandhini PS (2018) A low traceback and zero logging overhead IP traceback approach for communication networks. 2018 International Conference on Intelligent Computing and Communication for Smart World (I2C2SW)

  140. Manavi MT (2018) Defense mechanisms against Distributed Denial of Service attacks?: a survey. Computers & Electrical Engineering 72:26–38

    Article  Google Scholar 

  141. Mankin A, Massey D, Wu C-L, Wu SF, Zhang L (2001) On design and evaluation of “intention-driven” ICMP traceback. Proceedings Tenth International Conference on Computer Communications and Networks (Cat no.01EX495)

  142. Mankins D, Krishnan R, Boyd C, Zao J, Frentz M (2001) Mitigating distributed denial of service attacks with dynamic resource prcing Seventeenth Annual Computer Security Applications Conference

  143. Migga KJ (2017) Guide to Computer Network Security [Book]. - University of Tennessee Chattanooga, TN, USA : Springer Nature, June

  144. Mirkovic J, Reiher P (2005) d-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Transactions on Dependable and Secure Computing 2(3):216–232. https://doi.org/10.1109/tdsc.2005.35

    Article  Google Scholar 

  145. Mishra A, Gupta BB, Joshi RC (2011) A Comparative Study of Distributed Denial of Service Attacks. Intrusion Tolerance and Mitigation Techniques, European Intelligence and Security Informatics Conference

  146. Mittal V, Pilli ES, Joshi RC (2013) Flexible deterministic router and interface marking for IP traceback. International Journal of Computer Applications 64(4):1–6

    Article  Google Scholar 

  147. Mugunthan SR (2019) Soft computing based autonomous low rate DDOS attack detection and security for cloud computing. Journal of soft computing paradigm (JSCP) 1(02):80–90

    Google Scholar 

  148. Mythili T, Karthick Kiran M, Noorjahan S, Malliga Dr S (2019) An Enhanced Packet Marking and Traceback Algorithm for IP Traceback., APR | IRE Journals | CCCA - 2019 | Volume 2 Issue 10 | ISSN: 2456-8880

  149. NG CK, Pan L, Xiang Y (2018) Honeypot Frameworks and Their Applications: A New Framework. Springer Briefs on Cyber Security Systems and Networks. https://doi.org/10.1007/978-981-10-7739-5

  150. Nadiammai G, Hemalatha M (2014) Effective approach toward intrusion detection system using data mining techniques. Egyptian Informatics Journal 15 (1):37–50

    Article  Google Scholar 

  151. Nagy B, Orosz P, Tothfalusi T, Kovacs L, Varga P (2018) Detecting DDoS attacks within milliseconds by using FPGA-based hardware acceleration. NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium

  152. National Institute of Standards and Technology (1995) A Conceptual framework for system fault tolerance, Available from http://hissa.nist.gov/chissa/SEI-Framework/framework-1.html

  153. Negi PS, Garg A, Lal R (2020) Intrusion Detection and Prevention using Honeypot Network for Cloud Security, 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, pp 129–132

  154. Nguyen H, Choi Y (2010) Proactive detection of DDos attacks utilizing k-NN classifier in an Anti- DDos framework. Int J Electr Comput Syst Eng 4:247–252

    Google Scholar 

  155. Nilsson NJ (1996) Introduction to machine learning an early draft of a proposed textbook, robotics laboratory, department of computer science, stanford university stanford CA

  156. Oikonomou G, Mirkovic J, Reiher P, Robinson M (2006) A Framework for a Collaborative DDoS Defense. 2006 22nd Annual Computer Security Applications Conference (ACSAC’06)

  157. Okafor K, Okoye J, Ononiwu G (2016) Vulnerability Bandwidth Depletion Attack on Distributed Cloud Computing Network: A QoS Perspective. International Journal of Computer Applications 138:18–30. https://doi.org/10.5120/ijca2016908930

    Article  Google Scholar 

  158. Osanaiye O, Choo K-KR, Dlodlo M (2016) Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J Netw Comput Appl 67:147–165

    Article  Google Scholar 

  159. Ozcelik ?, Brooks RR (2016) Cusum-entropy: an efficient method for DDoS attack detection. Smart grid congress and fair (ICSG). 2016 4th International Istanbul (pp. 1–5). IEEE Istanbul, Turkey

  160. Park K, Lee H (2001) On the effectiveness of route-based packet filtering for Distributed DoS attack prevention in power-law Internets. In: Proceedings of the ACM SIGCOMM-01 conference on applications, technologies, architectures, and protocols for computer communications. ACM Press, New York, pp 15–26

  161. Park C, Shen H, Marron JS, Hernandez-Campos F, Veitch D (2006) Capturing the elusive poissonity in web traffic. In: 14th IEEE International Symposium on modeling, analysis, and simulation of computer and telecommunication systems, pp. 189e196

  162. Patnaik S, Zhong B (eds) (2014) Soft Computing Techniques in Engineering Applications. Studies in Computational Intelligence, Germany

    Google Scholar 

  163. Peddabachigari S, Abraham A, Grosan C, Thomas J (2007) Modeling intrusion detection system using hybrid intelligent systems. Journal of network and computer applications 30(1):114–132

    Article  Google Scholar 

  164. Peneti S, Nithin S, Reddy NCS (2020) A dynamic path based approach for preventing DDOS attacks. Journal of Critical Reviews 7(6):1328–1336

    Google Scholar 

  165. Peng T, Leckie C, Ramamohanarao K (2003) Protection from Distributed Denial of Service attack using history-based IP filtering. In: Proceedings of IEEE International Conference on Communications (ICC. Anchorage, AL, USA, p 2003

  166. Phan TV, Nguyen TG, Dao N-N, Huong TT, Thanh NH, Bauschert T (2020) Deepguard: Efficient Anomaly Detection in SDN with Fine-grained Traffic Flow Monitoring. IEEE Trans Netw Serv Manag, 1–1

  167. Pharande S, Pawar P, Wani PW, Patki AB (2015) Application of Hurst parameter and fuzzy logic for denial of service attack detection, 2015 IEEE International Advance Computing Conference (IACC), pp. 834–838,

  168. Pinz’on CI, De Paz JF, Navarro M, Bajo J, Juli’an V, Corchado JM (2011) Realtime CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks. Appl Soft Comput 11(7):4384–4398

    Article  Google Scholar 

  169. Poongodi M, Hamdi M, Sharma A, Ma M, Singh PK (2019) DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET, in IEEE Access, vol. 7, pp 183532–183544

  170. Poongodi M, Vijayakumar V, Al-Turjman F, Hamdi M, Ma M (2019) Intrusion Prevention System for DDoS Attack on VANET With reCAPTCHA Controller Using Information Based Metrics,” in IEEE Access, vol. 7, pp 158481–158491

  171. Qinquan W, ZaiLin P (2010) “Research on Network Attack and Detection Methods,” 2010 Second International Workshop on Education Technology and Computer Science, Wuhan, pp 630–633

  172. Raghavan SV, Dawson E (2011) An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks

  173. Rahman MM, Roy S, Yousuf MA (2019) DDos Mitigation and Intrusion Prevention in Content Delivery Networks using Distributed Virtual Honeypots, 2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT), Dhaka, Bangladesh, pp 1–6

  174. Rahul Vigneswaran K, Poornachandran P, Soman KP (2019) A Compendium on network and host based intrusion detection systems. Kumar, A, Paprzycki, M, & Gunjan, VK (eds.). (2020), ICDSMLA. Lecture Notes in Electrical Engineering

  175. Ramaki AA, Amini M, Atani RE (2014) RTECA: Real Time episode correlation algorithm for multi-step attack scenarios detection, Computers & Security

  176. Rohit MH, Fahim SM, Khan AHA (2019) “Mitigating and Detecting DDos attack on IoT Environment,” 2019 IEEE International Conference on Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON), Dhaka. Bangladesh, pp 5–8

  177. S. M RSM, Sreerekha LK (2018) DDos Prevention Using d-PID,2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, pp 453–457

  178. Sadoddin R, Ghorbani AA (2009) An incremental frequent structure mining framework for real-time alert correlation. Computers & Security 28 (3-4):153–173. https://doi.org/10.1016/j.cose.2008.11.010

    Article  Google Scholar 

  179. Sager G (1998) Security Fun with OCxmon and cflowd presented at the Internet, 2, Working Group

  180. Saifullah AM (2009) Defending against distributed denial-of-service attacks with weight-fair router throttling. Technical Report. Computer Science and Engineering, Washington University, St. Louis, USA. 2009-7

  181. Salim MM, Rathore S, Park JH (2019) Distributed denial of service attacks and its defenses in IoT: a survey. The Journal of Supercomputing

  182. Sardana A, Joshi R, Kim T (2008) “Deciding Optimal Entropic Thresholds to Calibrate the Detection Mechanism for Variable Rate DDos Attacks in ISP Domain,” 2008 international conference on information security and assurance (isa 2008), Busan, pp 270–275

  183. Sarnovsky M, Paralic J (2020) Hierarchical Intrusion Detection Using Machine Learning and Knowledge Model. Symmetry 12(2):203. https://doi.org/10.3390/sym12020203

    Article  Google Scholar 

  184. Sastry CS, Rawat S, Pujari AK, Gulati VP (2007) Network traffic analysis using singular value decomposition and multiscale transforms. Inf Sci 177(23):5275–5291

    Article  MATH  Google Scholar 

  185. Saurabh S, Sairam AS (2014) ICMP Based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters. Comput Commun 42:60–69

    Article  Google Scholar 

  186. Savage S, Wetherall D, Karlin A, Anderson T (2001) Network support for IP traceback. IEEE/ACM Trans Networking 9(3):226–237

    Article  Google Scholar 

  187. Saxena R, Dey S (2019) DDoS attack prevention using collaborative approach for cloud computing. Cluster Computing

  188. Schnackenberg D, Djahandari K, Sterne D (2000) Infrastructure for intrusion detection and response. Proceedings for DISCEX, January 2000

  189. Schnackenberg D, Djahandari K, Sterne D, Holiday H, Smith R (2001) Cooperative Intrusion Traceback and Response Architecture (CITRA). Proceedings of the 2nd DARPA Information Survivability Conference and Exposition. June 2001

  190. Sengupta N, Sil J (2020) (Cognitive Intelligence And Robotics) Intrusion Detection A Data Mining Approach-Springer

  191. Shafi Q, Basit A (2019) DDoS Botnet Prevention using Blockchain in Software Defined Internet of Things. 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp 624–628

  192. Sharma R, Chan CA, Leckie C (2020) Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing, 2020 IFIP Networking Conference (Networking), Paris, France, pp 343–351

  193. Shi Z, Li J, Wu C (2019) DeepDDoS: Online DDoS Attack Detection. 2019 IEEE Global Communications Conference (GLOBECOM)

  194. Shiaeles SN, Katos V, Karakos AS, Papadopoulos BK (2012) Real time DDos detection using fuzzy estimators. Computer Security 31:782–790

    Article  Google Scholar 

  195. Shiaeles SN, Katos V, Karakos AS, Papadopoulos BK (2012) Real time DDoS detection using fuzzy estimators. Computers & Security 31 (6):782–790

    Article  Google Scholar 

  196. Shohani RB, Mostafavi S, Hakami VA (2021) Statistical Model for Early Detection of DDos Attacks on Random Targets in SDN Wireless Pers Commun

  197. Šimon M, Huraj L (2019) A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks. In: Silhavy R (ed) Software Engineering Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-030-19807-7-12

  198. Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F, Kent ST, Strayer WT (2001) Hash-Based IP Traceback. Inproceedings of the BBN technologies ACM SIGCOMM conference, San Diego, California, U.S.A, Aug. 2001

  199. Snoeren AC, Partridge C, Sanchez LA, Jones CE, Tchakountio F, Kent ST, Strayer WT (2002) Single-Packet IP Traceback IEEE/ACM Trans. Networking 10(6):721–734

    Article  Google Scholar 

  200. Song D, Perrig A (2001) Advanced and authenticated marking schemes for IP traceback. Proceedings of the IEEE INFOCOM01, anchorage, AK, USA, 2001

  201. Spitzner L (2003) Honeytokens: the other honeypot

  202. Spitzner L (2003) Honeypots: catching the insider threat, in 19th Annual on Computer Security Applications Conference, 2003. Proceedings (IEEE), pp 170–179

  203. Srivastava A, Gupta B, Tyagi A, Sharma A, Mishra A (2011) A recent survey on DDos attacks and defense mechanisms. Advances in Parallel Distributed Computing, 570-580. Part of the Communications in Computer and Information Science book series (CCIS), 203

  204. Stevanovic D, An A, Vlajic N (2012) Feature evaluation for web crawler detection with data mining techniques. Expert Syst Appl 39(10):8707–8717

    Article  Google Scholar 

  205. Stone R (2000) Centertrack: An IP overlay network for tracking DoS floods. Inproceedings of 2000 USENIX Security Symp, 199–21

  206. Su MY (2011) Using clustering to improve the kNN-based classifiers for online anomaly network traffic identification. J Netw Comput Appl 34(2):722–730

    Article  Google Scholar 

  207. Su MY (2011) Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers. Expert Syst Appl 38(4):3492–3498

    Article  Google Scholar 

  208. Su M-Y, Yeh S-C (2010) An online response system for anomaly traffic by incremental mining with genetic optimization. Communications and Networks, Journal of 12(4):375–381

    Article  Google Scholar 

  209. Su M-Y, Yu G-J, Lin C-Y (2009) A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach. Computers & security 28(5):301–309

    Article  Google Scholar 

  210. Subba B (2019) A neural network based NIDS framework for intrusion detection in contemporary network traffic,” 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), GOA, India, pp 1–6

  211. Tan Z, Jamdagni A, He X, Nanda P, Liu RP (2014) A system for denial-of-service attack detection based on multivariate correlation analysis. Parallel and Distributed Systems, IEEE Transactions on 25(2):447–456

    Article  Google Scholar 

  212. Tanenbaum Andrew S, Weterhall David J (2014) Computer Networks [Book] - [s.l.]: Pearson Education Limited 2014

  213. Tao Y, Yu S (2013) DDoS attack detection at local area networks using information theoretical metrics. Trust, security and privacy in computing and communications (TrustCom). 2013 12th IEEE International Conference on (pp. 233–240). IEEE

  214. Tellenbach B, Burkhart M, Schatzmann D, Gugelmann D, Sornette D (2011) Accurate network anomaly classification with generalized entropy metrics. Comput Netw 55(15):3485–3502

    Article  Google Scholar 

  215. Thantharate A, Paropkari R, Walunj V, Beard C, Kankariya P (2020) Secure5G: A deep learning framework towards a secure network slicing in 5G and beyond. 2020 10th Annual Computing and Communication Workshop and Conference (CCWC)

  216. Thomas R, Mark B, Johnson T, Croall J (2003) Net bouncer: client-legitimacy-based high performance DDos filtering. Proceedings of the 3rd DARPA information survivability conference and exposition, Washington, DC, 22-24 April, pp. 111–113, IEEE CS, USA

  217. Tupakula UK, Varadharajan V (2003) A practical method to counteract denial of service attacks. In: proceedings of the 26th Australian computer conference in pesearch and practice in information technology, ACM international conference proceeding series, pp 204–275

  218. Udhayan J, Hamsapriya T (2011) Statistical Segregation Method to Minimize the False Detections During DDoS Attacks. IJ Network Security 13:152–160

    Google Scholar 

  219. Vacas I, Medeiros I, Neves N (2018) Detecting Network Threats using OSINT Knowledge-Based IDS. 2018 14th European Dependable Computing Conference (EDCC), pp 128–135

  220. Venkatesan R, Devi DR, Keerthana R, Kumar AA (2018) A novel approach for detecting DDos attack in h-IDS using association rule, 2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA), Pondicherry, pp 1–5

  221. Verma A (2004) Production honeypots: An organization’s view. SANS institute, Global Information assurance Certification Paper

    Google Scholar 

  222. Verwoerd T (2002) Intrusion detection techniques and approaches. Comput Commun 25 (15):1356–1365. https://doi.org/10.1016/s0140-3664(02)00037-3

    Article  Google Scholar 

  223. Vetha S, Vimala Devi K (2019) A trust-based hypervisor framework for preventing DDos attacks in cloud. Concurrency and Computation: Practice and Experience, p e5279

  224. Vijayalakshmi M, Shalinie SM (2014) Single Packet ICMP Traceback Technique using Router Interface

  225. Wang J, Phan RCW, Whitley JN, Parish DJ (2010) Augmented attack tree modeling of distributed denial of services and tree based attack detection method. Proceedings of the 10th IEEE International conference on computer and information technology, Bradford, UK, 29 June-1 July, pp. 1009–1014 IEEE CS

  226. Wang X, Reeves DS, Wu SF, Yuill J (2001) Sleepy watermark tracing: an active network-based intrusion response framework. In: proceedings of the 16th international conference of information security (IFIP/SEC-01), Paris, France

  227. Wang H, Zhang D, Shin KG (2002) Detecting SYN flooding attacks. INFOCOM 2002. Twenty-first annual joint conference of the IEEE computer and communications societies. Proceedings (pp 1530–1539) IEEE, New York, USA

  228. Wazid M, Das AK, Kumar N, Rodrigues JJPC (2017) Secure Three-Factor user authentication scheme for Renewable-Energy-Based smart grid environment. IEEE Transactions on Industrial Informatics 13 (6):3144–3153

    Article  Google Scholar 

  229. Weiler NN(n.d.) (2002) “Honeypots for distributed denial-of-service attacks”. Proceedings Eleventh IEEE international workshops on enabling technologies: infrastructure for collaborative enterprises

  230. Wu D, Lu K, Fan J, Todorovic S, Nucci A (2007) Robust and efficient detection of DDos attacks for large-scale internet. Computer Networks, 51, 5036-5056 Todorovic S., and Nucci A “Robust and efficient detection of DDos attacks for large-scale internet.” Computer Networks, 51 5036-5056

  231. Wu YC, Tseng HR, Yang W, Jan RH (2011) DoS detection and traceback with decision tree and grey relational analysis. International Journal of Ad Hoc and Ubiquitous Computing 7:121–136

    Article  Google Scholar 

  232. Wu SY, Yen E (2009) Data mining-based intrusion detectors. Expert Syst Appl 36(3):5605–5612

    Article  Google Scholar 

  233. Xiang Y, Zhou W, Gu M (2009) Flexible deterministic packet marking: an IP traceback system to find the real source of attacks. IEEE Transactions on Parallel and Distributed System 20(4):567–580

    Article  Google Scholar 

  234. Xiao-Yu W, et al. (2010) A SIP DoS flooding attack defense mechanism based on priority class queue. Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference, 428–31

  235. Xu X, Wang X (2005) An adaptive network intrusion detection method based on PCA and support vector machines. In: Proceedings of ADMA, pp 696–703

  236. Yan Q, Yu FR, Gong Q, Li J (2016) Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials 18(1):602–622

    Article  Google Scholar 

  237. Yao G, Bi J, Vasilakos AV (2015) Passive IP traceback: disclosing the locations of IP spoofers from path backscatter. IEEE T Inf Foren Sec 10 (3):471–484

    Article  Google Scholar 

  238. Yau DKY, Lui JCS, Liang F, Yam Y (2005) Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Trans. Netw. 13(1):29–42

    Article  Google Scholar 

  239. Yu J, Kang H, Park D, Bang H-C, Kang DW (2013) An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. J Syst Archit 59(10):1005–1012

    Article  Google Scholar 

  240. Yu J, Lee H, Kim M-S, Park D (2008) Traffic flooding attack detection with SNMP MIB using SVM. computer communications 31(17):4212–4219

    Article  Google Scholar 

  241. Zargar ST, Joshi J, Tipper D (2013) A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys & Tutorials 15(4):2046–2069

    Article  Google Scholar 

  242. Zhang G, Parashar M (2006) Cooperative defense against DDos attacks. J Res Pract Inf Technol 38:1–14

    Google Scholar 

  243. Zhang Z, Qi Q, Kumar N, et al. (2015) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimedia Tools and Applications 74:3477–3488

    Article  Google Scholar 

  244. Zhao W, Olshefski D, Schulzrinne H (2000) Internet Quality of Service: an Overview

  245. Zhauniarovich Y, Dodia P (2019) Sorting the garbage: Filtering Out DRDos Amplification Traffic in ISP Networks, 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, 142–150

  246. Zhijun W, Jingjie W, Meng Y (2018) Prevention of DoS Attacks in Information-Centric Networking, 2018 IEEE Conference on Application, Information and Network Security (AINS), Langkawi, Malaysia, pp 105–110

  247. Web link: https://security.radware.com/ddos-knowledge-center/ddos-chronicles/ddos-attacks-history/

  248. Web link: https://securelist.com/ddos-report-in-q1-2018/85373/

  249. https://securelist.com/ddos-report-q2-2019/91934/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neeraj Kumar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, A., Saha, R., Kumar, N. et al. A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development. Multimed Tools Appl 81, 19879–19944 (2022). https://doi.org/10.1007/s11042-021-11859-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11859-z

Keywords

Navigation