A Review on Distributed Denial of Service

被引:0
作者
Ali, Usman [1 ]
ul Hassan, Abu [1 ]
Malik, Muhammad Sheraz Arshad [2 ]
Hashmi, Syed Kashif [1 ]
Aslam, Bushra [1 ]
Ayub, Basit [1 ]
机构
[1] RIPHAH Int Univ, Comp Sci, Islamabad, Pakistan
[2] Govt Coll Univ, Faisalabad, Pakistan
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2018年 / 18卷 / 08期
关键词
DDoS; botnet; Syn flood; ICMP flood and UDP flood;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A denial of service attack consists of sending and requesting a lot of data to a server in a network, thus getting the server saturated and unable to respond to data requests that are legitimately made. This paper will discuss in detail about DDoS and the measures to prevent from it. The paper will also discuss its working phenomenon and some specific terms including botnet, Syn flood, ICMP flood and UDP flood. In the end, the paper will describe the DDoS mitigation services.
引用
收藏
页码:139 / 143
页数:5
相关论文
共 23 条
[1]  
Bedi H, 2013, IEEE GLOB COMM CONF, P1440, DOI 10.1109/GLOCOM.2013.6831276
[2]  
CABRERA JBD, 2001, P 7 IFIP IEEE INT S
[3]  
Choi C., 2014, METHOD DDOS ATTACK D
[4]  
David Jisa, 2 INT S BIG DAT CLOU, V50, P30
[5]   Understanding DDoS Attack & Its Effect In Cloud Environment [J].
Deshmukh, Rashmi V. ;
Devadkar, Kailas K. .
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND CONTROL(ICAC3'15), 2015, 49 :202-210
[6]  
Dhar Munish, INT J COMPUTER SCI I, V3, P27
[7]  
Huang Y., 2001, P 10 ICCCN OCT
[8]  
Ioannidis J., 2001, P IEEE INFOCOMM ANCH, P878
[9]  
Joshi J., 2013, IEEE COMMUNICATIONS
[10]  
Kambourakis G, 2017, DDOS IOT MIRAI OTHER