Survey on Recent DDoS Mitigation Techniques and Comparative Analysis

被引:5
作者
Rai, Ankur [1 ]
Challa, Rama Krishna [1 ]
机构
[1] NITTTR Chandigarh, Dept Comp Sci & Engn, Chandigarh, India
来源
2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT) | 2016年
关键词
DDoS; Mitigation techniques; application domain; comparative analysis;
D O I
10.1109/CICT.2016.27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Customers trust is the most important factor for an organization success. This trust only builds if customers receive unhindered services from their vendors. A major threat in successfully building a customer-vendor trust relationship exists in the form of Distributed Denial of Service attacks. These attacks have become more evasive and complex with time such that existing security mechanisms are not sufficient to counter them. A lot of techniques are already proposed by various researchers to counter these attacks which have their own application domain, advantages and disadvantages. In this paper we present an extensive survey of recent DDoS mitigation techniques along with their comparative analysis.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 50 条
  • [31] SDN Based Collaborative Scheme for Mitigation of DDoS Attacks
    Hameed, Sufian
    Khan, Hassan Ahmed
    FUTURE INTERNET, 2018, 10 (03)
  • [32] Advance DDOS detection and mitigation technique for securing cloud
    Zareapoor, Masoumeh
    Shamsolmoali, Pourya
    Alam, M. Afshar
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 303 - 310
  • [33] IHONEYCOL:A DISTRIBUTED COLLABORATIVE APPROACH FOR MITIGATION OF DDoS ATTACK
    Buvaneswari, M.
    Subha, T.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 340 - 345
  • [34] An Adaptive SYN Flooding attack Mitigation in DDOS Environment
    Hussain, Khalid
    Hussain, Syed Jawad
    Dillshad, Veena
    Nafees, Muhammad
    Azeem, Muhammad Awais
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (07): : 27 - 33
  • [35] Review of game theory approaches for DDoS mitigation by SDN
    Rathore, Shivani
    Bhandari, Abhinav
    PROCEEDINGS OF THE INDIAN NATIONAL SCIENCE ACADEMY, 2022, 88 (04): : 634 - 650
  • [36] Review of game theory approaches for DDoS mitigation by SDN
    Shivani Rathore
    Abhinav Bhandari
    Proceedings of the Indian National Science Academy, 2022, 88 : 634 - 650
  • [37] Comparison of Linux Filtering Tools for Mitigation of DDoS Attacks
    Blazek, Petr
    Gerlich, Tomas
    Martinasek, Zdenek
    Frolka, Jakub
    2018 41ST INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2018, : 145 - 149
  • [38] DDoS Classification using Combined Techniques
    Yusof, Mohd Azahari Mohd
    Safar, Noor Zuraidin Mohd
    Abdullah, Zubaile
    Ali, Firkhan Ali Hamid
    Sukri, Khairul Amin Mohamad
    Jofri, Muhamad Hanif
    Mohamed, Juliana
    Omar, Abdul Halim
    Bahrudin, Ida Aryanie
    Hani, Mohd Hatta Mohamed Ali Md
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (01) : 551 - 557
  • [39] DDoS attacks in Industrial IoT: A survey
    Chaudhary, Shubhankar
    Mishra, Pramod Kumar
    COMPUTER NETWORKS, 2023, 236
  • [40] Literature Survey - IDS for DDoS Attacks
    Prajapati, Naveen Mohan
    Mishra, Atish
    Bhanodia, Praveen
    2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,