References
- Eddy, Wesley M. “Defenses against TCP SYN flooding attacks.” The Internet Protocol Journal 9.4 (2006): 2-16
- Liu, Pi-E., and Zhong-Hua Sheng. “Defending Against TCP SYN Flooding with a new kind of SYN-Agent.” 2008 International Conference on Machine Learning and Cybernetics. Vol. 2. IEEE, 2008.
- Eddy, Wesley. TCP SYN flooding attacks and common mitigations. No. rfc4987. 2007.
- Ubale, Tushar, and Ankit Kumar Jain. “SRL: An TCP SYNFLOOD DDoS mitigation approach in software-defined networks.” 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2018.
- Lemon, Jonathan. “Resisting {SYN} Flood {DoS} Attacks with a {SYN} Cache.” BSDCon 2002 (BSDCon 2002). 2002.
- Rahouti, Mohamed, et al. “SYNGuard: Dynamic threshold based SYN flood attack detection and mitigation in software defined networks.” IET Networks 10.2 (2021): 76-87. doi: 10.1049/ntw2.12009
- Khalaf, Bashar Ahmed, et al. “Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods.” IEEE Access 7 (2019): 51691-51713. doi: 10.1109/ACCESS.2019.2908998
- Soliman, Ahmed K., Cherif Salama, and Hoda K. Mohamed. “Detecting DNS reflection amplification DDoS attack originating from the cloud.” 2018 13th International Conference on Computer Engineering and Systems (ICCES). IEEE, 2018.
- Virupakshar, Karan B., et al. “Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud.” Procedia Computer Science 167 (2020): 2297-2307. doi: 10.1016/j.procs.2020.03.282
- Gupta, Alka, and Lalit Sen Sharma. “Detecting attacks in high-speed networks: Issues and Solutions.” Information Security Journal: A Global Perspective 29.2 (2020): 51-61.
- Dahiya, Amrita, and B. B. Gupta. “A PBNM and economic incentive-based defensive mechanism against DDoS attacks.” Enterprise Information Systems 16.3 (2022): 406-426. doi: 10.1080/17517575.2019.1700553
- Kaur Chahal, Jasmeen, Abhinav Bhandari, and Sunny Behal. “Distributed denial of service attacks: a threat or challenge.” New Review of Information Networking 24.1 (2019): 31-103. doi: 10.1080/13614576.2019.1611468
- Baishya, Ram Charan, and D. K. Bhattacharyya. “A complete detection and mitigation framework to protect a network from DDoS attacks.” IETE Journal of Research 68.1 (2022): 315-332 doi: 10.1080/03772063.2019.1604173
- Singhal, Sunita, et al. “Detection of application layer DDoS attacks using big data technologies.” Journal of Discrete Mathematical Sciences and Cryptography 23.2 (2020): 563-571. doi: 10.1080/09720529.2020.1729505
- Fadhil, Saif Aamer. “Internet of Things security threats and key technologies.” Journal of Discrete Mathematical Sciences and Cryptography 24.7 (2021): 1951-1957. doi: 10.1080/09720529.2021.1957189
- Mishra, Narendra, and R. K. Singh. “Prioritisation and security defense algorithm for cloud specific vulnerability through scoring and base metric group.” Journal of Interdisciplinary Mathematics 23.2 (2020): 481-491. doi: 10.1080/09720502.2020.1731961