Survey on Recent DDoS Mitigation Techniques and Comparative Analysis

被引:5
|
作者
Rai, Ankur [1 ]
Challa, Rama Krishna [1 ]
机构
[1] NITTTR Chandigarh, Dept Comp Sci & Engn, Chandigarh, India
关键词
DDoS; Mitigation techniques; application domain; comparative analysis;
D O I
10.1109/CICT.2016.27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Customers trust is the most important factor for an organization success. This trust only builds if customers receive unhindered services from their vendors. A major threat in successfully building a customer-vendor trust relationship exists in the form of Distributed Denial of Service attacks. These attacks have become more evasive and complex with time such that existing security mechanisms are not sufficient to counter them. A lot of techniques are already proposed by various researchers to counter these attacks which have their own application domain, advantages and disadvantages. In this paper we present an extensive survey of recent DDoS mitigation techniques along with their comparative analysis.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 50 条
  • [1] A Survey on the Impact of DDoS Attacks in Cloud Computing: Prevention, Detection and Mitigation Techniques
    Srinivasan, Karthik
    Mubarakali, Azath
    Alqahtani, Abdulrahman Saad
    Kumar, A. Dinesh
    INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 252 - 270
  • [2] A Survey on malware analysis and mitigation techniques
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Vaidehi, V.
    COMPUTER SCIENCE REVIEW, 2019, 32 : 1 - 23
  • [3] A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions
    Chaganti, Rajasekhar
    Bhushan, Bharat
    Ravi, Vinayakumar
    COMPUTER COMMUNICATIONS, 2023, 197 : 96 - 112
  • [4] A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets
    Alhijawi, Bushra
    Almajali, Sufyan
    Elgala, Hany
    Salameh, Haythem Bany
    Ayyash, Moussa
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [5] Detection Techniques of DDoS Attacks: A Survey
    Kamboj, Priyanka
    Trivedi, Munesh Chandra
    Yadav, Virendra Kumar
    Singh, Vikash Kumar
    2017 4TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ELECTRONICS (UPCON), 2017, : 675 - 679
  • [6] DDoS mitigation using blockchain and machine learning techniques
    Jawahar, A.
    Kaythry, P.
    Kumar, Vinoth C.
    Vinu, R.
    Amrish, R.
    Bavapriyan, K.
    Gopinaath, V
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (21) : 60265 - 60278
  • [7] Machine Learning in OpenFlow Network: Comparative Analysis of DDoS Detection Techniques
    Singh, Arun Kumar
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2021, 18 (02) : 221 - 226
  • [8] A Recent Survey on DDoS Attacks and Defense Mechanisms
    Srivastava, A.
    Gupta, B. B.
    Tyagi, A.
    Sharma, Anupama
    Mishra, Anupama
    ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 570 - 580
  • [9] DDoS Detection and Prediction Techniques-A Survey
    Goyal, Ashtha
    Matta, Priya
    Gautam, Pratiksha
    Proceedings of International Conference on Computational Intelligence and Sustainable Engineering Solution, CISES 2023, 2023, : 820 - 826
  • [10] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517