rent landscape and future directions. In Versatile Cy-
bersecurity, pages 55–97. Springer.
David, J. and Thomas, C. (2015). Ddos attack detection us-
ing fast entropy approach on flow-based network traf-
fic. Procedia Computer Science, 50:30–36.
De Donno, M., Dragoni, N., Giaretta, A., and Spognardi,
A. (2018). Ddos-capable iot malwares: Comparative
analysis and mirai investigation. Security and Com-
munication Networks, 2018.
Douligeris, C. and Mitrokotsa, A. (2004). Ddos attacks and
defense mechanisms: classification and state-of-the-
art. Computer Networks, 44(5):643–666.
Girma, A., Moses, G., Li, J., Lui, C., and Abayomi, K.
(2015). Analysis of ddos attacks and an introduction
of a hybrid statistical model to detect ddos attacks on
cloud computing environment.
Gulihar, P. and Gupta, B. (2020). Cooperative mechanisms
for defending distributed denial of service (ddos) at-
tacks. In Handbook of Computer Networks and Cyber
Security, pages 421–443. Springer.
Hofstede, R., Barto
ˇ
s, V., Sperotto, A., and Pras, A. (2013).
Towards real-time intrusion detection for netflow and
ipfix. In Proceedings of the 9th International Con-
ference on Network and Service Management (CNSM
2013), pages 227–234. IEEE.
Hou, J., Fu, P., Cao, Z., and Xu, A. (2018). Machine learn-
ing based ddos detection through netflow analysis. In
MILCOM 2018-2018 IEEE Military Communications
Conference (MILCOM), pages 1–6. IEEE.
Hu, D., Hong, P., and Chen, Y. (2017). Fadm:
Ddos flooding attack detection and mitigation sys-
tem in software-defined networking. In GLOBE-
COM 2017-2017 IEEE Global Communications Con-
ference, pages 1–7. IEEE.
Kolias, C., Kambourakis, G., Stavrou, A., and Voas, J.
(2017). Ddos in the iot: Mirai and other botnets. Com-
puter, 50(7):80–84.
Radware (2017). Ddos attack history — radware security.
https://security.radware.com/ddos-knowledge-center/
ddos-chronicles/ddos-attacks-history/. (Accessed on
05/17/2020).
Sawaya, Y., Kubota, A., and Miyake, Y. (2011). Detection
of attackers in services using anomalous host behav-
ior based on traffic flow statistics. In 2011 IEEE/IPSJ
International Symposium on Applications and the In-
ternet, pages 353–359.
Shamsolmoali, P. and Zareapoor, M. (2014). Statistical-
based filtering system against ddos attacks in cloud
computing. In 2014 International Conference on Ad-
vances in Computing, Communications and Informat-
ics (ICACCI), pages 1234–1239.
Singh, K., Dhindsa, K. S., and Bhushan, B. (2018).
Threshold-based distributed ddos attack detection in
isp networks. Turkish Journal of Electrical Engineer-
ing & Computer Sciences, 26(4):1796–1811.
Xia, Z., Lu, S., and Li, J. (2012). Ddos flood attack de-
tection based on fractal parameters. In 2012 8th In-
ternational Conference on Wireless Communications,
Networking and Mobile Computing, pages 1–5.
You, Y., Zulkernine, M., and Haque, A. (2007). Detecting
flooding-based ddos attacks. In 2007 IEEE Interna-
tional Conference on Communications, pages 1229–
1234. IEEE.
Yuan, X., Li, C., and Li, X. (2017). Deepdefense: identify-
ing ddos attack via deep learning. In 2017 IEEE Inter-
national Conference on Smart Computing (SMART-
COMP), pages 1–8. IEEE.
Yun Liu, Jianping Yin, Jieren Cheng, and Boyun Zhang
(2010). Detecting ddos attacks using conditional en-
tropy. In 2010 International Conference on Computer
Application and System Modeling (ICCASM 2010),
volume 13, pages V13–278–V13–282.
Zargar, S. T., Joshi, J., and Tipper, D. (2013). A survey
of defense mechanisms against distributed denial of
service (ddos) flooding attacks. IEEE communications
surveys & tutorials, 15(4):2046–2069.
Zekri, M., El Kafhali, S., Aboutabit, N., and Saadi, Y.
(2017). Ddos attack detection using machine learn-
ing techniques in cloud computing environments. In
2017 3rd International Conference of Cloud Comput-
ing Technologies and Applications (CloudTech), pages
1–7. IEEE.
Zi, L., Yearwood, J., and Wu, X. (2010). Adaptive clus-
tering with feature ranking for ddos attacks detection.
In 2010 Fourth International Conference on Network
and System Security, pages 281–286.
Efficient and Secure Statistical DDoS Detection Scheme
161