A survey of Distributed Denial of Service attack

被引:0
|
作者
Mallikarjunan, K. Narasimha [1 ]
Muthupriya, K. [1 ]
Shalinie, S. Mercy [1 ]
机构
[1] Thiagarajar Coll Engn, Comp Sci & Engn, Madurai, Tamil Nadu, India
关键词
DDoS; botnets; UDP; TCP; server; resources;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security deals with a large number of subjects like spoofed message detection, audio processing, video surveillance and cyber-attack detections. However the biggest threat for the homeland security is cyber-attacks. Distributed Denial of Service attack is one among them. Interconnected systems such as database server, web server, cloud computing servers etc., are now under threads from network attackers. Denial of service is common attack in the internet which causes problem for both the user and the service providers. Distributed attack sources can be used to enlarge the attack in case of Distributed Denial of Service so that the effect of the attack will be high. Distributed Denial of Service attacks aims at exhausting the communication and computational power of the network by flooding the packets through the network and making malicious traffic in the network. In order to be an effective service the DDoS attack must be detected and mitigated quickly before the legitimate user access the attacker's target. The group of systems that is used to perform the DoS attack is known as the botnets. This paper introduces the overview of the state of art in DDoS attack detection strategies.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Survey on HTTP Flooding-A Distributed Denial of Service Attack
    Khandare, Hrishikesh
    Jain, Saurabh
    Doriya, Rajesh
    PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2022, 2023, 475 : 39 - 52
  • [2] Defeating the Distributed Denial of Service Attack in Cloud Environment: A Survey
    Divyasree, I. R.
    Selvamani, K.
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [3] A survey of distributed denial-of-service attack, prevention, and mitigation techniques
    Mahjabin, Tasnuva
    Xiao, Yang
    Sun, Guang
    Jiang, Wangdong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12):
  • [4] Massive distributed denial of service attack
    不详
    COMPUTERS & SECURITY, 2003, 22 (06) : 465 - 465
  • [5] Survey on distributed denial of service attack detection using deep learning: A review
    Jassem, Manal Dawood
    Abdulrahman, Amer Abdulmajeed
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (02): : 753 - 762
  • [6] Formalized Description of Distributed Denial of Service Attack
    杜彦辉
    马锐
    刘玉树
    Journal of Beijing Institute of Technology, 2004, (04) : 360 - 364
  • [7] A detection design for distributed denial of service attack
    Fujita, N
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, : 78 - 82
  • [8] Distributed Denial of Service: Attack techniques and mitigation
    Vanitha, K. S.
    Uma, S. V.
    Mahidhar, S. K.
    2017 2ND INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, AND COMMUNICATIONS (CCUBE), 2017, : 226 - 231
  • [9] An analysis and fingerprinting of a distributed denial of service attack
    Sung, MH
    Haas, M
    Xu, J
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VIII, PROCEEDINGS: CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS II, 2002, : 274 - 279
  • [10] Honeypot Scheme for Distributed Denial-of-Service Attack
    Das, Vinu V.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501