Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Mohammed A. Saleh , Azizah Abdul Manaf

ABSTRACT

As the dependency on web technology increases every day, there is on the other side an increase in destructive attempts to disrupt an essential web technology, which yields an improper service. Denial of Service (DoS) attack and its large counterpart Distributed Denial of Service (DDoS) and Flash Crowd attacks are among the most dangerous internet attacks, which overwhelm the web server, thereby slow it down, and eventually take it down completely. This review paper evaluates and describes the effectiveness of different existing Frameworks and Schemes for Detecting and Preventing High Rate DoS/DDoS and Flash Crowd Attacks. Firstly, the review paper describes them according to the similar category, and then it compares them based on the predefined metrics. Finally, advantages and disadvantages for each category are described. More... »

PAGES

145-152

Book

TITLE

Advanced Machine Learning Technologies and Applications

ISBN

978-3-319-13460-4
978-3-319-13461-1

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15

DOI

http://dx.doi.org/10.1007/978-3-319-13461-1_15

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1052346600


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Technology Malaysia", 
          "id": "https://www.grid.ac/institutes/grid.410877.d", 
          "name": [
            "Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Baru, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Saleh", 
        "givenName": "Mohammed A.", 
        "id": "sg:person.012740750601.29", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012740750601.29"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Technology Malaysia", 
          "id": "https://www.grid.ac/institutes/grid.410877.d", 
          "name": [
            "Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Manaf", 
        "givenName": "Azizah Abdul", 
        "id": "sg:person.011517162741.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011517162741.70"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1109/tc.2010.88", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061535045"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2011.2107320", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061629802"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tpds.2009.147", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061753461"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icrtit.2011.5972268", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093274250"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/waina.2012.166", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093637598"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/dasc.2011.86", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093739108"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/ias.2009.298", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093833560"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icnp.2011.6089077", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094092018"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/glocom.2011.6133798", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094220996"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccct.2011.6075132", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094436111"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/cisis.2010.53", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094506207"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/comsnets.2011.5716474", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094578691"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/trustcom.2012.233", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094775579"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccnc.2012.6167480", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094999764"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/aiccsa.2011.6126615", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095123800"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccsnt.2011.6181964", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095472615"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "As the dependency on web technology increases every day, there is on the other side an increase in destructive attempts to disrupt an essential web technology, which yields an improper service. Denial of Service (DoS) attack and its large counterpart Distributed Denial of Service (DDoS) and Flash Crowd attacks are among the most dangerous internet attacks, which overwhelm the web server, thereby slow it down, and eventually take it down completely. This review paper evaluates and describes the effectiveness of different existing Frameworks and Schemes for Detecting and Preventing High Rate DoS/DDoS and Flash Crowd Attacks. Firstly, the review paper describes them according to the similar category, and then it compares them based on the predefined metrics. Finally, advantages and disadvantages for each category are described.", 
    "editor": [
      {
        "familyName": "Hassanien", 
        "givenName": "Aboul Ella", 
        "type": "Person"
      }, 
      {
        "familyName": "Tolba", 
        "givenName": "Mohamed F.", 
        "type": "Person"
      }, 
      {
        "familyName": "Taher Azar", 
        "givenName": "Ahmad", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-13461-1_15", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-13460-4", 
        "978-3-319-13461-1"
      ], 
      "name": "Advanced Machine Learning Technologies and Applications", 
      "type": "Book"
    }, 
    "name": "Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review", 
    "pagination": "145-152", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-13461-1_15"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "f95827187e16cb67a329881b673418e559eaec181fbe774dc2dbf56a5e8ed63c"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1052346600"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-13461-1_15", 
      "https://app.dimensions.ai/details/publication/pub.1052346600"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T22:01", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000275.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-13461-1_15"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15'


 

This table displays all metadata directly associated to this object as RDF triples.

131 TRIPLES      23 PREDICATES      43 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-13461-1_15 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nbe35e90a215945a9b7c8cf9692d2c2df
4 schema:citation https://doi.org/10.1109/aiccsa.2011.6126615
5 https://doi.org/10.1109/cisis.2010.53
6 https://doi.org/10.1109/comsnets.2011.5716474
7 https://doi.org/10.1109/dasc.2011.86
8 https://doi.org/10.1109/glocom.2011.6133798
9 https://doi.org/10.1109/ias.2009.298
10 https://doi.org/10.1109/iccct.2011.6075132
11 https://doi.org/10.1109/iccnc.2012.6167480
12 https://doi.org/10.1109/iccsnt.2011.6181964
13 https://doi.org/10.1109/icnp.2011.6089077
14 https://doi.org/10.1109/icrtit.2011.5972268
15 https://doi.org/10.1109/tc.2010.88
16 https://doi.org/10.1109/tifs.2011.2107320
17 https://doi.org/10.1109/tpds.2009.147
18 https://doi.org/10.1109/trustcom.2012.233
19 https://doi.org/10.1109/waina.2012.166
20 schema:datePublished 2014
21 schema:datePublishedReg 2014-01-01
22 schema:description As the dependency on web technology increases every day, there is on the other side an increase in destructive attempts to disrupt an essential web technology, which yields an improper service. Denial of Service (DoS) attack and its large counterpart Distributed Denial of Service (DDoS) and Flash Crowd attacks are among the most dangerous internet attacks, which overwhelm the web server, thereby slow it down, and eventually take it down completely. This review paper evaluates and describes the effectiveness of different existing Frameworks and Schemes for Detecting and Preventing High Rate DoS/DDoS and Flash Crowd Attacks. Firstly, the review paper describes them according to the similar category, and then it compares them based on the predefined metrics. Finally, advantages and disadvantages for each category are described.
23 schema:editor N0742010689d7447088a0c9c7b3feae67
24 schema:genre chapter
25 schema:inLanguage en
26 schema:isAccessibleForFree false
27 schema:isPartOf N12e8929f3ff44ee698bbf9a9b9b95c19
28 schema:name Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review
29 schema:pagination 145-152
30 schema:productId N349c48b4e77a4cc7b110036e41baf894
31 N4eb9031a69974af6a81f2934be3b6a31
32 Nc3fbf74023454ecc9f82f73d6f59af60
33 schema:publisher N04badb592a6c40b88e8e2da34c854197
34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052346600
35 https://doi.org/10.1007/978-3-319-13461-1_15
36 schema:sdDatePublished 2019-04-15T22:01
37 schema:sdLicense https://scigraph.springernature.com/explorer/license/
38 schema:sdPublisher N3820794b397b4e17b63d468861f87a5c
39 schema:url http://link.springer.com/10.1007/978-3-319-13461-1_15
40 sgo:license sg:explorer/license/
41 sgo:sdDataset chapters
42 rdf:type schema:Chapter
43 N04badb592a6c40b88e8e2da34c854197 schema:location Cham
44 schema:name Springer International Publishing
45 rdf:type schema:Organisation
46 N0742010689d7447088a0c9c7b3feae67 rdf:first N2703301feca14ff08c3710375d76471a
47 rdf:rest Ne89a0efa471d4134bde31b44b6e00d34
48 N12e8929f3ff44ee698bbf9a9b9b95c19 schema:isbn 978-3-319-13460-4
49 978-3-319-13461-1
50 schema:name Advanced Machine Learning Technologies and Applications
51 rdf:type schema:Book
52 N2703301feca14ff08c3710375d76471a schema:familyName Hassanien
53 schema:givenName Aboul Ella
54 rdf:type schema:Person
55 N2bf655a0f1a34628bb8c9514a34d2fa1 schema:familyName Taher Azar
56 schema:givenName Ahmad
57 rdf:type schema:Person
58 N349c48b4e77a4cc7b110036e41baf894 schema:name dimensions_id
59 schema:value pub.1052346600
60 rdf:type schema:PropertyValue
61 N3820794b397b4e17b63d468861f87a5c schema:name Springer Nature - SN SciGraph project
62 rdf:type schema:Organization
63 N4eb9031a69974af6a81f2934be3b6a31 schema:name readcube_id
64 schema:value f95827187e16cb67a329881b673418e559eaec181fbe774dc2dbf56a5e8ed63c
65 rdf:type schema:PropertyValue
66 N88e81d7f852444d6b63e2426398cec00 schema:familyName Tolba
67 schema:givenName Mohamed F.
68 rdf:type schema:Person
69 N96c61ff6f3cf4dcb834dace205a9a72b rdf:first sg:person.011517162741.70
70 rdf:rest rdf:nil
71 Nbac213ca18d640e5958f06bae1394750 rdf:first N2bf655a0f1a34628bb8c9514a34d2fa1
72 rdf:rest rdf:nil
73 Nbe35e90a215945a9b7c8cf9692d2c2df rdf:first sg:person.012740750601.29
74 rdf:rest N96c61ff6f3cf4dcb834dace205a9a72b
75 Nc3fbf74023454ecc9f82f73d6f59af60 schema:name doi
76 schema:value 10.1007/978-3-319-13461-1_15
77 rdf:type schema:PropertyValue
78 Ne89a0efa471d4134bde31b44b6e00d34 rdf:first N88e81d7f852444d6b63e2426398cec00
79 rdf:rest Nbac213ca18d640e5958f06bae1394750
80 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information and Computing Sciences
82 rdf:type schema:DefinedTerm
83 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
84 schema:name Data Format
85 rdf:type schema:DefinedTerm
86 sg:person.011517162741.70 schema:affiliation https://www.grid.ac/institutes/grid.410877.d
87 schema:familyName Manaf
88 schema:givenName Azizah Abdul
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011517162741.70
90 rdf:type schema:Person
91 sg:person.012740750601.29 schema:affiliation https://www.grid.ac/institutes/grid.410877.d
92 schema:familyName Saleh
93 schema:givenName Mohammed A.
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012740750601.29
95 rdf:type schema:Person
96 https://doi.org/10.1109/aiccsa.2011.6126615 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095123800
97 rdf:type schema:CreativeWork
98 https://doi.org/10.1109/cisis.2010.53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094506207
99 rdf:type schema:CreativeWork
100 https://doi.org/10.1109/comsnets.2011.5716474 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094578691
101 rdf:type schema:CreativeWork
102 https://doi.org/10.1109/dasc.2011.86 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093739108
103 rdf:type schema:CreativeWork
104 https://doi.org/10.1109/glocom.2011.6133798 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094220996
105 rdf:type schema:CreativeWork
106 https://doi.org/10.1109/ias.2009.298 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093833560
107 rdf:type schema:CreativeWork
108 https://doi.org/10.1109/iccct.2011.6075132 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094436111
109 rdf:type schema:CreativeWork
110 https://doi.org/10.1109/iccnc.2012.6167480 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094999764
111 rdf:type schema:CreativeWork
112 https://doi.org/10.1109/iccsnt.2011.6181964 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095472615
113 rdf:type schema:CreativeWork
114 https://doi.org/10.1109/icnp.2011.6089077 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094092018
115 rdf:type schema:CreativeWork
116 https://doi.org/10.1109/icrtit.2011.5972268 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093274250
117 rdf:type schema:CreativeWork
118 https://doi.org/10.1109/tc.2010.88 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061535045
119 rdf:type schema:CreativeWork
120 https://doi.org/10.1109/tifs.2011.2107320 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061629802
121 rdf:type schema:CreativeWork
122 https://doi.org/10.1109/tpds.2009.147 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061753461
123 rdf:type schema:CreativeWork
124 https://doi.org/10.1109/trustcom.2012.233 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094775579
125 rdf:type schema:CreativeWork
126 https://doi.org/10.1109/waina.2012.166 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093637598
127 rdf:type schema:CreativeWork
128 https://www.grid.ac/institutes/grid.410877.d schema:alternateName University of Technology Malaysia
129 schema:name Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia
130 Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Baru, Malaysia
131 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...