Chanu et al., 2020
| Publication | Publication Date | Title |
|---|---|---|
| Agrawal et al. | Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges | |
| Dayal et al. | Research trends in security and DDoS in SDN | |
| Prasad et al. | An efficient detection of flooding attacks to Internet Threat Monitors (ITM) using entropy variations under low traffic | |
| Thapngam et al. | Discriminating DDoS attack traffic from flash crowd through packet arrival patterns | |
| Sanmorino et al. | DDoS attack detection method and mitigation using pattern of the flow | |
| Harshita | Detection and prevention of ICMP flood DDOS attack | |
| Zang et al. | Botnet detection through fine flow classification | |
| Prasad et al. | Discriminating ddos attack traffic from flash crowds on internet threat monitors (itm) using entropy variations | |
| Thakur et al. | Detection and prevention of botnets and malware in an enterprise network | |
| Mohammadi et al. | SYN‐Guard: An effective counter for SYN flooding attack in software‐defined networking | |
| Shaaban et al. | Distributed denial of service attacks analysis, detection, and mitigation for the space control ground network: DDoS attacks analysis, detection and mitigation | |
| Robinson et al. | Evaluation of mitigation methods for distributed denial of service attacks | |
| Ghazali et al. | Flooding distributed denial of service attacks-a review | |
| Kukreti et al. | DDoS attack using SYN flooding: A case study | |
| Kralevska et al. | Towards 5g intrusion detection scenarios with omnet++ | |
| Maheshwari et al. | Mitigation of ddos attacks using probability based distributed hop count filtering and round trip time | |
| Chanu et al. | Detection of Routing Infrastructure | |
| Djalaliev et al. | Sentinel: hardware-accelerated mitigation of bot-based DDoS attacks | |
| Akhter et al. | Modeling DDoS Attacks with IP Spoofing and Hop-Count Defense Measure Using OPNET Modeler | |
| Chanu et al. | Detection of routing infrastructure attack in TCP connection | |
| Lee et al. | A perspective towards NCIFA and CIFA in named-data networking architecture | |
| Vadehra et al. | Impact evaluation of distributed denial of service attacks using ns2 | |
| Kurar et al. | Internet scale DoS attacks | |
| Tesfahun et al. | Botnet detection and countermeasures-a survey | |
| Yi et al. | DDoS detection algorithm using the bidirectional session |