Reference Hub15
A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches

A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches

Esraa Alomari, Selvakumar Manickam, B. B. Gupta, Mohammed Anbar, Redhwan M. A. Saad, Samer Alsaleem
ISBN13: 9781522501053|ISBN10: 1522501053|EISBN13: 9781522501060
DOI: 10.4018/978-1-5225-0105-3.ch003
Cite Chapter Cite Chapter

MLA

Alomari, Esraa, et al. "A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches." Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, edited by Brij Gupta, et al., IGI Global, 2016, pp. 52-79. https://doi.org/10.4018/978-1-5225-0105-3.ch003

APA

Alomari, E., Manickam, S., Gupta, B. B., Anbar, M., Saad, R. M., & Alsaleem, S. (2016). A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches. In B. Gupta, D. Agrawal, & S. Yamaguchi (Eds.), Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (pp. 52-79). IGI Global. https://doi.org/10.4018/978-1-5225-0105-3.ch003

Chicago

Alomari, Esraa, et al. "A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches." In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, edited by Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, 52-79. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0105-3.ch003

Export Reference

Mendeley
Favorite

Abstract

A Botnet can be used to launch a cyber-attack, such as a Distributed Denial of Service (DDoS) attack, against a target or to conduct a cyber-espionage campaign to steal sensitive information. This survey analyzes and compares the most important efforts carried out in an application-based detection area and this survey extended to cover the mitigation approaches for the Botnet-based DDoS flooding attacks. It accomplishes four tasks: first, an extensive illustration on Internet Security; second, an extensive comparison between representative detection mechanisms; third, the comparison between the mitigation mechanisms against Botnet-based DDoS flooding and fourth, the description of the most important problems and highlights in the area. We conclude that the area has achieved great advances so far, but there are still many open problems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.