Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Mohammed A. Saleh , Azizah Abdul Manaf

ABSTRACT

As the dependency on web technology increases every day, there is on the other side an increase in destructive attempts to disrupt an essential web technology, which yields an improper service. Denial of Service (DoS) attack and its large counterpart Distributed Denial of Service (DDoS) and Flash Crowd attacks are among the most dangerous internet attacks, which overwhelm the web server, thereby slow it down, and eventually take it down completely. This review paper evaluates and describes the effectiveness of different existing Frameworks and Schemes for Detecting and Preventing High Rate DoS/DDoS and Flash Crowd Attacks. Firstly, the review paper describes them according to the similar category, and then it compares them based on the predefined metrics. Finally, advantages and disadvantages for each category are described. More... »

PAGES

145-152

Book

TITLE

Advanced Machine Learning Technologies and Applications

ISBN

978-3-319-13460-4
978-3-319-13461-1

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15

DOI

http://dx.doi.org/10.1007/978-3-319-13461-1_15

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1052346600


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Technology Malaysia", 
          "id": "https://www.grid.ac/institutes/grid.410877.d", 
          "name": [
            "Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Baru, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Saleh", 
        "givenName": "Mohammed A.", 
        "id": "sg:person.012740750601.29", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012740750601.29"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Technology Malaysia", 
          "id": "https://www.grid.ac/institutes/grid.410877.d", 
          "name": [
            "Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Manaf", 
        "givenName": "Azizah Abdul", 
        "id": "sg:person.011517162741.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011517162741.70"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1109/tc.2010.88", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061535045"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tifs.2011.2107320", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061629802"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tpds.2009.147", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061753461"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icrtit.2011.5972268", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093274250"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/waina.2012.166", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093637598"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/dasc.2011.86", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093739108"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/ias.2009.298", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093833560"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icnp.2011.6089077", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094092018"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/glocom.2011.6133798", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094220996"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccct.2011.6075132", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094436111"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/cisis.2010.53", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094506207"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/comsnets.2011.5716474", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094578691"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/trustcom.2012.233", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094775579"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccnc.2012.6167480", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094999764"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/aiccsa.2011.6126615", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095123800"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccsnt.2011.6181964", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095472615"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "As the dependency on web technology increases every day, there is on the other side an increase in destructive attempts to disrupt an essential web technology, which yields an improper service. Denial of Service (DoS) attack and its large counterpart Distributed Denial of Service (DDoS) and Flash Crowd attacks are among the most dangerous internet attacks, which overwhelm the web server, thereby slow it down, and eventually take it down completely. This review paper evaluates and describes the effectiveness of different existing Frameworks and Schemes for Detecting and Preventing High Rate DoS/DDoS and Flash Crowd Attacks. Firstly, the review paper describes them according to the similar category, and then it compares them based on the predefined metrics. Finally, advantages and disadvantages for each category are described.", 
    "editor": [
      {
        "familyName": "Hassanien", 
        "givenName": "Aboul Ella", 
        "type": "Person"
      }, 
      {
        "familyName": "Tolba", 
        "givenName": "Mohamed F.", 
        "type": "Person"
      }, 
      {
        "familyName": "Taher Azar", 
        "givenName": "Ahmad", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-13461-1_15", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-13460-4", 
        "978-3-319-13461-1"
      ], 
      "name": "Advanced Machine Learning Technologies and Applications", 
      "type": "Book"
    }, 
    "name": "Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review", 
    "pagination": "145-152", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-13461-1_15"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "f95827187e16cb67a329881b673418e559eaec181fbe774dc2dbf56a5e8ed63c"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1052346600"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-13461-1_15", 
      "https://app.dimensions.ai/details/publication/pub.1052346600"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T22:01", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000275.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-13461-1_15"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-13461-1_15'


 

This table displays all metadata directly associated to this object as RDF triples.

131 TRIPLES      23 PREDICATES      43 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-13461-1_15 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Ne8aa73a3a99045158e015f017c9fa23a
4 schema:citation https://doi.org/10.1109/aiccsa.2011.6126615
5 https://doi.org/10.1109/cisis.2010.53
6 https://doi.org/10.1109/comsnets.2011.5716474
7 https://doi.org/10.1109/dasc.2011.86
8 https://doi.org/10.1109/glocom.2011.6133798
9 https://doi.org/10.1109/ias.2009.298
10 https://doi.org/10.1109/iccct.2011.6075132
11 https://doi.org/10.1109/iccnc.2012.6167480
12 https://doi.org/10.1109/iccsnt.2011.6181964
13 https://doi.org/10.1109/icnp.2011.6089077
14 https://doi.org/10.1109/icrtit.2011.5972268
15 https://doi.org/10.1109/tc.2010.88
16 https://doi.org/10.1109/tifs.2011.2107320
17 https://doi.org/10.1109/tpds.2009.147
18 https://doi.org/10.1109/trustcom.2012.233
19 https://doi.org/10.1109/waina.2012.166
20 schema:datePublished 2014
21 schema:datePublishedReg 2014-01-01
22 schema:description As the dependency on web technology increases every day, there is on the other side an increase in destructive attempts to disrupt an essential web technology, which yields an improper service. Denial of Service (DoS) attack and its large counterpart Distributed Denial of Service (DDoS) and Flash Crowd attacks are among the most dangerous internet attacks, which overwhelm the web server, thereby slow it down, and eventually take it down completely. This review paper evaluates and describes the effectiveness of different existing Frameworks and Schemes for Detecting and Preventing High Rate DoS/DDoS and Flash Crowd Attacks. Firstly, the review paper describes them according to the similar category, and then it compares them based on the predefined metrics. Finally, advantages and disadvantages for each category are described.
23 schema:editor Ne6caca3e997c4486b34511c4f25f892b
24 schema:genre chapter
25 schema:inLanguage en
26 schema:isAccessibleForFree false
27 schema:isPartOf Nc4b121aabc6b494fa955f64f4529bc9f
28 schema:name Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review
29 schema:pagination 145-152
30 schema:productId N1a906fd1744e4b6296888b1c932aa0aa
31 N526ecd24cfc7416db9944ab30c9a6f0d
32 N7da40eb5992d48199ec1a685a71c92a4
33 schema:publisher N85e19227d4a54cf282122855a76e7d3e
34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052346600
35 https://doi.org/10.1007/978-3-319-13461-1_15
36 schema:sdDatePublished 2019-04-15T22:01
37 schema:sdLicense https://scigraph.springernature.com/explorer/license/
38 schema:sdPublisher N7c9ab0a091024740a85b2341b0726da6
39 schema:url http://link.springer.com/10.1007/978-3-319-13461-1_15
40 sgo:license sg:explorer/license/
41 sgo:sdDataset chapters
42 rdf:type schema:Chapter
43 N10402efa4529465da1e79011814cb3cd schema:familyName Tolba
44 schema:givenName Mohamed F.
45 rdf:type schema:Person
46 N1a906fd1744e4b6296888b1c932aa0aa schema:name doi
47 schema:value 10.1007/978-3-319-13461-1_15
48 rdf:type schema:PropertyValue
49 N526ecd24cfc7416db9944ab30c9a6f0d schema:name dimensions_id
50 schema:value pub.1052346600
51 rdf:type schema:PropertyValue
52 N66b091bae95a4180b71a967ff54db586 schema:familyName Hassanien
53 schema:givenName Aboul Ella
54 rdf:type schema:Person
55 N6f3588cd0a9d4e71b976a461300ddef2 schema:familyName Taher Azar
56 schema:givenName Ahmad
57 rdf:type schema:Person
58 N7c9ab0a091024740a85b2341b0726da6 schema:name Springer Nature - SN SciGraph project
59 rdf:type schema:Organization
60 N7da40eb5992d48199ec1a685a71c92a4 schema:name readcube_id
61 schema:value f95827187e16cb67a329881b673418e559eaec181fbe774dc2dbf56a5e8ed63c
62 rdf:type schema:PropertyValue
63 N85e19227d4a54cf282122855a76e7d3e schema:location Cham
64 schema:name Springer International Publishing
65 rdf:type schema:Organisation
66 N90838c56b082428bbad079ab4df512a0 rdf:first sg:person.011517162741.70
67 rdf:rest rdf:nil
68 Na293d2bb6c484b67b21963c6e769d6aa rdf:first N10402efa4529465da1e79011814cb3cd
69 rdf:rest Nc3d107d706d94759914239c296b9162e
70 Nc3d107d706d94759914239c296b9162e rdf:first N6f3588cd0a9d4e71b976a461300ddef2
71 rdf:rest rdf:nil
72 Nc4b121aabc6b494fa955f64f4529bc9f schema:isbn 978-3-319-13460-4
73 978-3-319-13461-1
74 schema:name Advanced Machine Learning Technologies and Applications
75 rdf:type schema:Book
76 Ne6caca3e997c4486b34511c4f25f892b rdf:first N66b091bae95a4180b71a967ff54db586
77 rdf:rest Na293d2bb6c484b67b21963c6e769d6aa
78 Ne8aa73a3a99045158e015f017c9fa23a rdf:first sg:person.012740750601.29
79 rdf:rest N90838c56b082428bbad079ab4df512a0
80 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information and Computing Sciences
82 rdf:type schema:DefinedTerm
83 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
84 schema:name Data Format
85 rdf:type schema:DefinedTerm
86 sg:person.011517162741.70 schema:affiliation https://www.grid.ac/institutes/grid.410877.d
87 schema:familyName Manaf
88 schema:givenName Azizah Abdul
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011517162741.70
90 rdf:type schema:Person
91 sg:person.012740750601.29 schema:affiliation https://www.grid.ac/institutes/grid.410877.d
92 schema:familyName Saleh
93 schema:givenName Mohammed A.
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012740750601.29
95 rdf:type schema:Person
96 https://doi.org/10.1109/aiccsa.2011.6126615 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095123800
97 rdf:type schema:CreativeWork
98 https://doi.org/10.1109/cisis.2010.53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094506207
99 rdf:type schema:CreativeWork
100 https://doi.org/10.1109/comsnets.2011.5716474 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094578691
101 rdf:type schema:CreativeWork
102 https://doi.org/10.1109/dasc.2011.86 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093739108
103 rdf:type schema:CreativeWork
104 https://doi.org/10.1109/glocom.2011.6133798 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094220996
105 rdf:type schema:CreativeWork
106 https://doi.org/10.1109/ias.2009.298 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093833560
107 rdf:type schema:CreativeWork
108 https://doi.org/10.1109/iccct.2011.6075132 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094436111
109 rdf:type schema:CreativeWork
110 https://doi.org/10.1109/iccnc.2012.6167480 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094999764
111 rdf:type schema:CreativeWork
112 https://doi.org/10.1109/iccsnt.2011.6181964 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095472615
113 rdf:type schema:CreativeWork
114 https://doi.org/10.1109/icnp.2011.6089077 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094092018
115 rdf:type schema:CreativeWork
116 https://doi.org/10.1109/icrtit.2011.5972268 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093274250
117 rdf:type schema:CreativeWork
118 https://doi.org/10.1109/tc.2010.88 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061535045
119 rdf:type schema:CreativeWork
120 https://doi.org/10.1109/tifs.2011.2107320 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061629802
121 rdf:type schema:CreativeWork
122 https://doi.org/10.1109/tpds.2009.147 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061753461
123 rdf:type schema:CreativeWork
124 https://doi.org/10.1109/trustcom.2012.233 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094775579
125 rdf:type schema:CreativeWork
126 https://doi.org/10.1109/waina.2012.166 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093637598
127 rdf:type schema:CreativeWork
128 https://www.grid.ac/institutes/grid.410877.d schema:alternateName University of Technology Malaysia
129 schema:name Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Kuala Lumpur, Malaysia
130 Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Baru, Malaysia
131 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...