|
Number | Scheme/framework | Objective | Providing/protecting |
HR-DDOS | LR-DDOS | FC | OB | TB & CV |
|
1 | Service oriented traceback architecture (SOTA) [1] | Identify attack source. | ✗ | ✗ | ✗ | ✗ | ✓ |
|
2 | Filtering tree [2] | Protect Cloud Computing against XML and HTTP DDoS attacks. | ✗ | ✗ | ✗ | ✓ | ✓ |
|
3 | Attack source identification at router level using marking algorithm [3] | Overcome IP spoofing. | ✗ | ✗ | ✗ | ✓ | ✓ |
|
4 | Confidence based filtering (CBF) [4] | Firewall web application. | ✓ | ✗ | ✗ | ✓ | ✗ |
|
5 | A New algorithm for detecting and defending CC attacks [5] | Protect web server from CC attacks. | ✗ | ✗ | ✗ | ✗ | ✓ |
|
6 | Intelligent decision prototype (IDP) [6] | Identify and defend attack source. | ✗ | ✗ | ✗ | ✓ | ✓ |
|
7 | Defense system for cloud computing [7] | Trace and identify the real source of DDoS attacks. | ✗ | ✗ | ✗ | ✓ | ✓ |
|
8 | EDoS-Shield [8] | Mitigate the economic denial of sustainability (EDoS) attack in the cloud computing. | ✗ | ✗ | ✗ | ✓ | ✓ |
|
9 | Diagnosis of network anomaly based on statistical traffic analysis [9] | Spot the anomalies of network Traffic. | ✓ | ✗ | ✗ | ✓ | ✗ |
|
10 | Dynamic hidden semi-Markov model (HTTP) [10] | Model the time varying user to detect web DDoS attacks. | ✓ | ✗ | ✗ | ✗ | ✗ |
|
11 | Enhanced fast-SCTF [11] | Detect and filter distributed reflection denial of service (DRDoS) attacks. | ✗ | ✗ | ✗ | ✓ | ✓ |
|
12 | IP to hop count mapping table (IP2HC) filtering technique [12] | Defend against IP spoofing attack. | ✗ | ✗ | ✗ | ✓ | ✓ |
|
13 | Transition matrix [13] | Detect HTTP application based DDoS attacks. | ✓ | ✗ | ✗ | ✗ | ✗ |
|
14 | Relative entropy based HTTP application DDoS detection [14] | Detect HTTP application based DDoS attacks. | ✓ | ✗ | ✗ | ✗ | ✗ |
|
15 | Analysis of network’s traffic by using IP addresses correlation [15] | Detect network DDoS attacks. | ✓ | ✗ | ✗ | ✗ | ✗ |
|
16 | Large deviation measuring click ratio based web access behavior (LD-IID) scheme and large deviation measuring web access behavior based on Markov process (LD-MP) scheme [16] | Detect HTTP application based DDoS attacks. | ✓ | ✗ | ✗ | ✗ | ✗ |
|
17 | Chi-square based space (CSDM) Davison method [17] | Enhance anomaly detection system accuracy. | ✓ | ✗ | ✗ | ✗ | ✗ |
|
18 | An advanced entropy based DDoS detection scheme [18] | Determine the most suitable threshold value for detecting DDoS attacks accurately. | ✓ | ✓ | ✓ | ✗ | ✗ |
|
19 | HTTP reject [19] | Block user’s requests on the IP layer during DDoS attacks and keep the end user to be notified as well. | ✓ | ✗ | ✗ | ✗ | ✗ |
|
20 | CALD [20] | Protect web server from flash crowd. | ✓ | ✗ | ✓ | ✓ | ✗ |
|
21 | VicSifter [21] | Detect DDoS attacks and determine the attack’s victims at an early stage. | ✓ | ✗ | ✗ | ✗ | ✓ |
|
22 | Throttling DDoS attacks [22] | Eliminate and slow down the impact of DDoS attacks against web server. | ✗ | ✗ | ✗ | ✓ | ✓ |
|
23 | An early DoS/DDoS attacks detection method based on the concept of short-term entropy [23] | Focus on the early DoS/DDoS attacks detection. | ✓ | ✓ | ✗ | ✗ | ✗ |
|
24 | A real time DDoS attacks detection and prevention system based on the analysis of per IP traffic behavior [24] | Monitor and detect DDoS attacks near to the attack’s source. | ✓ | ✗ | ✗ | ✓ | ✗ |
|