Distributed Denial of Service: Attack techniques and mitigation

被引:0
|
作者
Vanitha, K. S. [1 ]
Uma, S. V. [1 ]
Mahidhar, S. K. [1 ]
机构
[1] RNS Inst Technol, Dept Elect & Commun Engn, Bangalore, Karnataka, India
关键词
Distributed Denial of Service; Ping flooding; TCP SYN flooding; TCP RST attack; UDP flooding; HTTP GET flooding; Rate detection; Port checking; SYN thresholding; RST thresholding;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming the server with malicious traffic. DDoS attacks have become the most tedious and cumbersome issue in recent past. The number and magnitude of attacks have increased from few megabytes of data to 100s of terabytes of data these days. Due to the differences in the attack patterns or new types of attack, it is hard to detect these attacks effectively. In this paper, we devise new techniques for causing DDoS attacks and mitigation which are clearly shown to perform much better than the existing techniques. We also categorize DDoS attack techniques as well as the techniques used in their detection and thus attempt an extensive scoping of the DDoS problem. We also compare our attack module with a couple of tools available.
引用
下载
收藏
页码:226 / 231
页数:6
相关论文
共 50 条
  • [21] Attack Detection of Distributed Denial of Service Based on Splunk
    Su, Te-Jen
    Wang, Shih-Ming
    Chen, Yi-Feng
    Liu, Chao-Liang
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 397 - 400
  • [22] Characterization and Comparison of Distributed Denial of Service Attack Tools
    Kaur, Harjeet
    Behal, Sunny
    Kumar, Krishan
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1139 - 1145
  • [23] Intrusion detection of distributed denial of service attack in cloud
    Velliangiri, S.
    Premalatha, J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623
  • [24] Distributed Denial of Service attack on Cloud: Detection and Prevention
    Khadka, Bikram
    Withana, Chandana
    Alsadoon, Abeer
    Elchouemi, Amr
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [25] Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation
    Wu, Yongdong
    Suhendra, Vivy
    Saputra, Hendra
    Zhao, Zhigang
    2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 115 - 122
  • [26] Mitigation of Denial of Service Attack with Hardware Trojans in NoC Architectures
    Boraten, Travis
    Kodi, Avinash Karanth
    2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2016), 2016, : 1091 - 1100
  • [27] Distributed Denial of Service Attack Prevention at Source Machines
    Misono, Masanori
    Yoshida, Kaito
    Hwang, Juho
    Shinagawa, Takahiro
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 488 - 495
  • [28] A Zero-Sum Mitigation Game Model for Distributed Denial of Service Attack Using Linear Programming
    Amadi, E. C.
    Eheduru, G. E.
    Eze, F. U.
    Ikerionwu, C.
    Amuji, H. O.
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON ELECTRO-TECHNOLOGY FOR NATIONAL DEVELOPMENT (NIGERCON), 2017, : 327 - 333
  • [29] An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
    Riskhan, Basheer
    Safuan, Halawati Abd Jalil
    Hussain, Khalid
    Elnour, Asma Abbas Hassan
    Abdelmaboud, Abdelzahir
    Khan, Fazlullah
    Kundi, Mahwish
    SENSORS, 2023, 23 (14)
  • [30] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89