Survey on Recent DDoS Mitigation Techniques and Comparative Analysis

被引:5
作者
Rai, Ankur [1 ]
Challa, Rama Krishna [1 ]
机构
[1] NITTTR Chandigarh, Dept Comp Sci & Engn, Chandigarh, India
来源
2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT) | 2016年
关键词
DDoS; Mitigation techniques; application domain; comparative analysis;
D O I
10.1109/CICT.2016.27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Customers trust is the most important factor for an organization success. This trust only builds if customers receive unhindered services from their vendors. A major threat in successfully building a customer-vendor trust relationship exists in the form of Distributed Denial of Service attacks. These attacks have become more evasive and complex with time such that existing security mechanisms are not sufficient to counter them. A lot of techniques are already proposed by various researchers to counter these attacks which have their own application domain, advantages and disadvantages. In this paper we present an extensive survey of recent DDoS mitigation techniques along with their comparative analysis.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 50 条
  • [1] A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets
    Alhijawi, Bushra
    Almajali, Sufyan
    Elgala, Hany
    Salameh, Haythem Bany
    Ayyash, Moussa
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [2] DDoS Attack Detection and Mitigation Techniques in Cloud Computing Environment
    Devi, Kiruthika B. S.
    Subbulakshmi, T.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 512 - 517
  • [3] DDoS attacks in VoIP: a brief review of detection and mitigation techniques
    Narayanan, Sambath
    Manickam, Selvakumar
    Leau, Yu-Beng
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2016, 3 (09): : 90 - 96
  • [4] DDoS attack detection techniques in IoT networks: a survey
    Pakmehr, Amir
    Assmuth, Andreas
    Taheri, Negar
    Ghaffari, Ali
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14637 - 14668
  • [5] A Review on Distributed Denial of Service (DDoS) Mitigation Techniques in Cloud Computing Environment
    Ahamed, Junath Naseer
    Iyengar, N. Ch. S. N.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 277 - 294
  • [6] A survey of DDoS attacking techniques and defence mechanisms in the IoT network
    Vishwakarma, Ruchi
    Jain, Ankit Kumar
    TELECOMMUNICATION SYSTEMS, 2020, 73 (01) : 3 - 25
  • [7] A Comprehensive Survey of Distributed Defense Techniques against DDoS Attacks
    Sachdeva, Monika
    Singh, Gurvinder
    Kumar, Krishan
    Singh, Kuldip
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 7 - 15
  • [8] A survey of DDoS attacking techniques and defence mechanisms in the IoT network
    Ruchi Vishwakarma
    Ankit Kumar Jain
    Telecommunication Systems, 2020, 73 : 3 - 25
  • [9] Scalable DDoS Mitigation System
    Blazek, Petr
    Gerlich, Tomas
    Martinasek, Zdenek
    2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, : 617 - 620
  • [10] Detection and mitigation of DDoS in SDN
    Pande, Bhavika
    Bhagat, Gargi
    Priya, Shanu
    Agrawal, Himanshu
    2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 371 - 373