A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

被引:752
作者
Zargar, Saman Taghavi [1 ]
Joshi, James [2 ]
Tipper, David [1 ]
机构
[1] Univ Pittsburgh, Sch Informat Sci, Telecommun & Networking Program, Pittsburgh, PA 15260 USA
[2] Univ Pittsburgh, Sch Informat Sci, Pittsburgh, PA 15260 USA
关键词
Distributed Denial of Service (DDoS) flooding attack; intrusion detection systems; intrusion prevention systems; distributed DDoS defense; collaborative DDoS defense; OF-SERVICE; CLASSIFICATION; ROUTERS; FILTER; MODEL;
D O I
10.1109/SURV.2013.031413.00127
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies (i.e., Botnets). Once an attack army has been set up, an attacker can invoke a coordinated, large-scale attack against one or more targets. Developing a comprehensive defense mechanism against identified and anticipated DDoS flooding attacks is a desired goal of the intrusion detection and prevention research community. However, the development of such a mechanism requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various DDoS flooding attacks. In this paper, we explore the scope of the DDoS flooding attack problem and attempts to combat it. We categorize the DDoS flooding attacks and classify existing countermeasures based on where and when they prevent, detect, and respond to the DDoS flooding attacks. Moreover, we highlight the need for a comprehensive distributed and collaborative defense approach. Our primary intention for this work is to stimulate the research community into developing creative, effective, efficient, and comprehensive prevention, detection, and response mechanisms that address the DDoS flooding problem before, during and after an actual attack.
引用
收藏
页码:2046 / 2069
页数:24
相关论文
共 131 条
[21]  
[Anonymous], 2011, ARB APPL BRIEF GROW
[22]   Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks [J].
Argyraki, Katerina ;
Cheriton, David R. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (04) :1284-1297
[23]   Cyberinsurance in IT security management [J].
Baer, Walter S. ;
Parkinson, Andrew .
IEEE SECURITY & PRIVACY, 2007, 5 (03) :50-56
[24]  
Bosco T., 2005, P WEIS 05 HARV MA JU
[25]  
Bradley K. A., 1998, P 1998 IEEE S SEC PR
[26]  
BreakingPoint Labs, 2011, APPL LAYER DDOS ATT
[27]  
Burch H, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P319
[28]  
Cabrera J. B. D., 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470), P609, DOI 10.1109/INM.2001.918069
[29]  
Carter J., 2012, INTERNET THINGS IT L
[30]  
CERT, 2001, DEN SERV ATT