Survey on Recent DDoS Mitigation Techniques and Comparative Analysis

被引:5
作者
Rai, Ankur [1 ]
Challa, Rama Krishna [1 ]
机构
[1] NITTTR Chandigarh, Dept Comp Sci & Engn, Chandigarh, India
来源
2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT) | 2016年
关键词
DDoS; Mitigation techniques; application domain; comparative analysis;
D O I
10.1109/CICT.2016.27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Customers trust is the most important factor for an organization success. This trust only builds if customers receive unhindered services from their vendors. A major threat in successfully building a customer-vendor trust relationship exists in the form of Distributed Denial of Service attacks. These attacks have become more evasive and complex with time such that existing security mechanisms are not sufficient to counter them. A lot of techniques are already proposed by various researchers to counter these attacks which have their own application domain, advantages and disadvantages. In this paper we present an extensive survey of recent DDoS mitigation techniques along with their comparative analysis.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 50 条
  • [21] An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques
    Butt, Muhammad Arif
    Ajmal, Zarafshan
    Khan, Zafar Iqbal
    Idrees, Muhammad
    Javed, Yasir
    APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [22] DoS and DDoS mitigation using Variational Autoencoders
    Barli, Eirik Molde
    Yazidi, Anis
    Viedma, Enrique Herrera
    Haugerud, Harek
    COMPUTER NETWORKS, 2021, 199
  • [23] DDoS Mitigation: A Measurement-Based Approach
    Jonker, Mattijs
    Sperotto, Anna
    Pras, Aiko
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [24] DDOS Mitigation Cloud-Based Service
    Guenane, Fouad
    Nogueira, Michele
    Serhrouchni, Ahmed
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1363 - 1368
  • [25] SCALABLE DDOS MITIGATION SYSTEM FOR DATA CENTERS
    Martinasek, Zdenek
    ADVANCES IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2015, 13 (04) : 332 - 337
  • [26] A Rule Based DDoS Detection and Mitigation Technique
    Khamruddin, A. Md.
    Rupa, B. Dr Ch.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [27] Survey on DDoS defense mechanisms
    Fenil, E.
    Kumar, P. Mohan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (04)
  • [28] The Impact Analysis and Mitigation of DDoS Attack on Local Government Electronic Procurement Service (LPSE)
    Akbar, Salman
    Endroyono
    Wibawa, Adhi Dharma
    2016 INTERNATIONAL SEMINAR ON INTELLIGENT TECHNOLOGY AND ITS APPLICATIONS (ISITIA): RECENT TRENDS IN INTELLIGENT COMPUTATIONAL TECHNOLOGIES FOR SUSTAINABLE ENERGY, 2016, : 405 - 410
  • [29] An Impact Analysis: Real Time DDoS Attack Detection and Mitigation using Machine Learning
    Devi, B. S. Kiruthika
    Preetha, G.
    Selvaram, G.
    Shalinie, S. Mercy
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [30] Future of DDoS Attacks Mitigation in Software Defined Networks
    Vizvary, Martin
    Vykopal, Jan
    MONITORING AND SECURING VIRTUALIZED NETWORKS AND SERVICES, 2014, 8508 : 123 - 127