TY - GEN
T1 - Techniques for detecting and preventing denial of service attacks (A systematic review approach)
AU - Zare, Hossein
AU - Azadi, Mojgan
AU - Olsen, Peter
N1 - Publisher Copyright:
© Springer International Publishing AG 2018.
PY - 2018
Y1 - 2018
N2 - This paper analyzes denial of service (DoS) attacks and countermeasures based on a systematic review analysis conducted of papers between 2000 and 2016. The paper is based on three searches. The first was conducted using suitable keywords, the second using references used by selected papers, and, the third considered the most cited English-language articles. We discuss 802.11 along with one of the well-known DoS attacks at physical-level access points. Experts suggest using 802.11w, a “cryptographic client puzzle,” and “delaying the effect of request” to provide better protection in this layer. The paper discusses four main network defense systems against network-based attacks— source-end, core-end, victim-end, and distributed techniques—with a focus on two innovative methods, the D-WARD and gossip models. This study also discusses chi-squares and intrusion detection systems (IDSs), two effective models to detect DoS and DDoS attacks.
AB - This paper analyzes denial of service (DoS) attacks and countermeasures based on a systematic review analysis conducted of papers between 2000 and 2016. The paper is based on three searches. The first was conducted using suitable keywords, the second using references used by selected papers, and, the third considered the most cited English-language articles. We discuss 802.11 along with one of the well-known DoS attacks at physical-level access points. Experts suggest using 802.11w, a “cryptographic client puzzle,” and “delaying the effect of request” to provide better protection in this layer. The paper discusses four main network defense systems against network-based attacks— source-end, core-end, victim-end, and distributed techniques—with a focus on two innovative methods, the D-WARD and gossip models. This study also discusses chi-squares and intrusion detection systems (IDSs), two effective models to detect DoS and DDoS attacks.
KW - Chi-square
KW - D-WARD
KW - Denial-of-service attacks
KW - Gossip
KW - IEEE-802.11
KW - Intrusion detection systems
KW - Systematic review
UR - http://www.scopus.com/inward/record.url?scp=85045854531&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85045854531&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-54978-1_21
DO - 10.1007/978-3-319-54978-1_21
M3 - Conference contribution
AN - SCOPUS:85045854531
SN - 9783319549774
T3 - Advances in Intelligent Systems and Computing
SP - 151
EP - 157
BT - Information Technology – New Generations - 14th International Conference on Information Technology
A2 - Latifi, Shahram
PB - Springer Verlag
T2 - 14th International Conference on Information Technology - New Generations, ITNG 2017
Y2 - 10 April 2017 through 12 April 2017
ER -