Please use this identifier to cite or link to this item: https://idr.l3.nitk.ac.in/jspui/handle/123456789/13982
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPraseed A.-
dc.contributor.authorSanthi Thilagam, P.-
dc.date.accessioned2020-03-31T14:22:12Z-
dc.date.available2020-03-31T14:22:12Z-
dc.date.issued2019-
dc.identifier.citationIEEE Communications Surveys and Tutorials, 2019, Vol.21, 1, pp.661-685en_US
dc.identifier.uri10.1109/COMST.2018.2870658-
dc.identifier.urihttps://idr.nitk.ac.in/jspui/handle/123456789/13982-
dc.description.abstractDistributed denial of service (DDoS) attacks are some of the most devastating attacks against Web applications. A large number of these attacks aim to exhaust the network bandwidth of the server, and are called network layer DDoS attacks. They are volumetric attacks and rely on a large volume of network layer packets to throttle the bandwidth. However, as time passed, network infrastructure became more robust and defenses against network layer attacks also became more advanced. Recently, DDoS attacks have started targeting the application layer. Unlike network layer attacks, these attacks can be carried out with a relatively low attack volume. They also utilize legitimate application layer requests, which makes it difficult for existing defense mechanisms to detect them. These attacks target a wide variety of resources at the application layer and can bring a server down much faster, and with much more stealth, than network layer DDoS attacks. Over the past decade, research on application layer DDoS attacks has focused on a few classes of these attacks. This paper attempts to explore the entire spectrum of application layer DDoS attacks using critical features that aid in understanding how these attacks can be executed. defense mechanisms against the different classes of attacks are also discussed with special emphasis on the features that aid in the detection of different classes of attacks. Such a discussion is expected to help researchers understand why a particular group of features are useful in detecting a particular class of attacks. © 2018 IEEE.en_US
dc.titleDDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applicationsen_US
dc.typeReviewen_US
Appears in Collections:5. Miscellaneous Publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.