Distributed Denial of Service (DDoS): A History

被引:9
作者
Brooks, Richard R. [1 ]
Yu, Lu [1 ]
Ozcelik, Ilker [2 ]
Oakley, Jon [3 ]
Tusing, Nathan [4 ]
机构
[1] Clemson Univ, Holcombe Dept Elect & Comp Engn, Clemson, SC 29634 USA
[2] Recep Tayyip Erdogan Univ, Dept Comp Engn, TR-53100 Merkez Rize, Turkey
[3] Clemson Univ, Clemson, SC 29634 USA
[4] Clemson Univ, Holcombe Dept Elect & Comp Engn, Comp Engn, Clemson, SC 29634 USA
基金
美国国家科学基金会;
关键词
Denial-of-service attack;
D O I
10.1109/MAHC.2021.3072582
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early Internet, DDoS attacks have persisted. This article presents the technologies and tools that are used in DDoS, followed by a timeline of the major DDoS incidents. This is followed by a discussion of the primary classes of DDoS incidents and how the computing ecosystem enables DDoS. Early attacks were related to hacker culture, but their focus quickly changed to commercial exploitation. There have also been a number of political uses of DDoS, including cyberwar, hacktivism, and terrorism.
引用
收藏
页码:44 / 54
页数:11
相关论文
共 52 条
  • [1] A. Technica, 2013, SPAMM GO WAR SPAMH D
  • [2] Anderson R., 2008, SECURITY ENG GUIDE B, V2nd
  • [3] Berghel H., 2003, COMMUN ACM, V46, P15
  • [4] Democracy denied, youth participation and criminalizing digital dissent
    Bessant, Judith
    [J]. JOURNAL OF YOUTH STUDIES, 2016, 19 (07) : 921 - 937
  • [5] Biffl Stefan, 2006, VALUE BASED SOFTWARE
  • [6] Brooks RichardR., 2013, Introduction to Computer and Network Security: Navigating Shades of Gray
  • [7] Brunner J., 1975, SHOCKWAVE RIDER
  • [8] Calem R. E., NEW YORKS PANIX SERV
  • [9] Cheswick W. R., 2003, FIREWALLS INTERNET S
  • [10] CNN Online, CNN ONLINE