Distributed Denial of Service: Attack techniques and mitigation

被引:0
|
作者
Vanitha, K. S. [1 ]
Uma, S. V. [1 ]
Mahidhar, S. K. [1 ]
机构
[1] RNS Inst Technol, Dept Elect & Commun Engn, Bangalore, Karnataka, India
关键词
Distributed Denial of Service; Ping flooding; TCP SYN flooding; TCP RST attack; UDP flooding; HTTP GET flooding; Rate detection; Port checking; SYN thresholding; RST thresholding;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming the server with malicious traffic. DDoS attacks have become the most tedious and cumbersome issue in recent past. The number and magnitude of attacks have increased from few megabytes of data to 100s of terabytes of data these days. Due to the differences in the attack patterns or new types of attack, it is hard to detect these attacks effectively. In this paper, we devise new techniques for causing DDoS attacks and mitigation which are clearly shown to perform much better than the existing techniques. We also categorize DDoS attack techniques as well as the techniques used in their detection and thus attempt an extensive scoping of the DDoS problem. We also compare our attack module with a couple of tools available.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 50 条
  • [31] Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment
    Bhushan, Kriti
    Gupta, B. B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (05) : 1985 - 1997
  • [32] Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing
    Shameli-Sendi, Alireza
    Pourzandi, Makan
    Fekih-Ahmed, Mohamed
    Cheriet, Mohamed
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 58 : 165 - 179
  • [33] Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment
    Kriti Bhushan
    B. B. Gupta
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 1985 - 1997
  • [34] A Novel Model for Distributed Denial of Service Attack Analysis and Interactivity
    Ahmad, Ashraf
    AbuHour, Yousef
    Alghanim, Firas
    SYMMETRY-BASEL, 2021, 13 (12):
  • [35] The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack
    Rikhotso, Vukosi
    Velempini, Mthulisi
    AD HOC NETWORKS AND TOOLS FOR IT, ADHOCNETS 2021, 2022, 428 : 63 - 71
  • [36] Modeling Distributed Denial of Service Attack in Advanced Metering Infrastructure
    Guo, Yonghe
    Ten, Chee-Wooi
    Hu, Shiyan
    Weaver, Wayne W.
    2015 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2015,
  • [37] Implementation of Honeypot to Detect and Prevent Distributed Denial of Service Attack
    Sembiring, Irwan
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2016, : 345 - 350
  • [38] Modeling Distributed Denial of Service Attack in Advanced Metering Infrastructure
    Guo, Yonghe
    Ten, Chee-Wooi
    Hu, Shiyan
    Weaver, Wayne W.
    2015 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2015,
  • [39] Tensor based framework for Distributed Denial of Service attack detection
    Maranhao, Joao Paulo A.
    da Costa, Joao Paulo C. L.
    Javidi, Elnaz
    Borges de Andrade, Cesar A.
    de Sousa Jr, Rafael T.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 174
  • [40] THE SLOW HTTP DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION IN CLOUD
    Dhanapal, A.
    Nithyanandam, P.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (02): : 285 - 297