Defending against Distributed Denial of Service Attacks: Issues and Challenges

被引:38
|
作者
Gupta, B. B. [1 ]
Joshi, R. C. [1 ]
Misra, Manoj [1 ]
机构
[1] Indian Inst Technol, Dept Elect & Comp Engn, Roorkee 247667, Uttar Pradesh, India
来源
INFORMATION SECURITY JOURNAL | 2009年 / 18卷 / 05期
关键词
attack mechanisms; defense mechanisms; Distributed Denial-of-Service (DDoS); network security;
D O I
10.1080/19393550903317070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks on user machines, organizations, and infrastructures of the Internet have become highly publicized incidents and call for immediate solution. It is a complex and difficult problem characterized by an explicit attempt of the attackers to prevent access to resources by legitimate users for which they have authorization. Several schemes have been proposed on how to defend against these attacks, yet the problem still lacks a complete solution. The main purpose of this paper is therefore twofold. First is to present a comprehensive study of a wide range of DDoS attacks and defense methods proposed to combat them. This provides better understanding of the problem, current solution space, and future research scope to defend against DDoS attacks. Second is to propose an integrated solution for completely defending against flooding DDoS attacks at the Internet Service Provider (ISP) level.
引用
收藏
页码:224 / 247
页数:24
相关论文
共 50 条
  • [1] Defending against distributed denial of service attacks with bating puzzle auction
    Kim, S
    Wee, K
    Hong, M
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 361 - 366
  • [2] Defending networks against denial of service attacks
    Gelenbe, E
    Gellman, M
    Loukas, G
    [J]. UNMANNED/UNATTENDED SENSORS AND SENSOR NETWORKS, 2004, 5611 : 233 - 243
  • [3] Defending against denial of service attacks in scout
    Spatscheck, O
    Peterson, LL
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE THIRD SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '99), 1999, : 59 - 72
  • [4] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51
  • [5] Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy
    Alashhab, Ziyad R.
    Anbar, Mohammed
    Singh, Manmeet Mahinderjit
    Hasbullah, Iznan H.
    Jain, Prateek
    Al-Amiedy, Taief Alaa
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [6] Defending against denial-of-service attacks with puzzle auctions
    Wang, XF
    Reiter, MK
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 78 - 92
  • [7] IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
    Chan, EYK
    Chan, HW
    Chan, KM
    Chan, VPS
    Chanson, ST
    Cheung, MMH
    Chong, CF
    Chow, KP
    Hui, AKT
    Hui, LCK
    Lam, LCK
    Lau, WC
    Pun, KKH
    Tsang, AYF
    Tsang, WW
    Tso, SCW
    Yeung, DY
    Yu, KY
    [J]. I-SPAN 2004: 7TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2004, : 581 - 586
  • [8] Countermeasures against Distributed Denial of Service attacks
    Stefanidis, K.
    Serpanos, D. N.
    [J]. 2005 IEEE INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2005, : 439 - 442
  • [9] Denial of service and distributed denial of service attacks
    Piskozub, A
    [J]. MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2002, : 303 - 304
  • [10] Distributed defense against distributed denial-of-service attacks
    Shi, W
    Xiang, Y
    Zhou, WL
    [J]. DISTRIBUTED AND PARALLEL COMPUTING, 2005, 3719 : 357 - 362