A survey of Distributed Denial of Service attack

被引:0
|
作者
Mallikarjunan, K. Narasimha [1 ]
Muthupriya, K. [1 ]
Shalinie, S. Mercy [1 ]
机构
[1] Thiagarajar Coll Engn, Comp Sci & Engn, Madurai, Tamil Nadu, India
关键词
DDoS; botnets; UDP; TCP; server; resources;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security deals with a large number of subjects like spoofed message detection, audio processing, video surveillance and cyber-attack detections. However the biggest threat for the homeland security is cyber-attacks. Distributed Denial of Service attack is one among them. Interconnected systems such as database server, web server, cloud computing servers etc., are now under threads from network attackers. Denial of service is common attack in the internet which causes problem for both the user and the service providers. Distributed attack sources can be used to enlarge the attack in case of Distributed Denial of Service so that the effect of the attack will be high. Distributed Denial of Service attacks aims at exhausting the communication and computational power of the network by flooding the packets through the network and making malicious traffic in the network. In order to be an effective service the DDoS attack must be detected and mitigated quickly before the legitimate user access the attacker's target. The group of systems that is used to perform the DoS attack is known as the botnets. This paper introduces the overview of the state of art in DDoS attack detection strategies.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [41] A survey of bots used for distributed denial of service attacks
    Thing, Vrizlynn L. L.
    Sloman, Morris
    Dulay, Naranker
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 229 - +
  • [42] Denial of service and distributed denial of service attacks
    Piskozub, A
    MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2002, : 303 - 304
  • [43] Attack diagnosis: Throttling distributed denial-of-service attacks close to the attack sources
    Chen, RL
    Park, JM
    ICCCN 2005: 14TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2005, : 275 - 280
  • [44] Distributed denial of service attack prediction: Challenges, open issues and opportunities
    de Neira, Anderson Bergamini
    Kantarci, Burak
    Nogueira, Michele
    COMPUTER NETWORKS, 2023, 222
  • [45] Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure
    Asri, Satin
    Pranggono, Bernardi
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (03) : 2211 - 2223
  • [46] A detection scheme against Distributed Reflector Denial-of-Service attack
    Kim, YS
    Jeon, JC
    Jeon, JW
    Yoo, KY
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 44 - 48
  • [47] The Design of SDN based Detection for Distributed Denial of Service (DDoS) attack
    Oo, Myo Myint
    Kamolphiwong, Sinchai
    Kamolphiwong, Thossaporn
    2017 21ST INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC 2017), 2017, : 258 - 263
  • [48] Using simulation to evaluate decisive action in Distributed Denial of Service attack
    Iwu, FO
    Zobel, RN
    SIMULATION IN INDUSTRY 2001, 2001, : 92 - 99
  • [49] Optimal Placement of Detection Nodes against Distributed Denial of Service Attack
    Islam, Muhammad Hasan
    Nadeem, Kamran
    Khan, Shoab A.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 675 - 679
  • [50] Distributed denial of service attack detection using an ensemble of neural classifier
    Kumar, P. Arun Raj
    Selvakumar, S.
    COMPUTER COMMUNICATIONS, 2011, 34 (11) : 1328 - 1341