Distributed Denial of Service: Attack techniques and mitigation

被引:0
|
作者
Vanitha, K. S. [1 ]
Uma, S. V. [1 ]
Mahidhar, S. K. [1 ]
机构
[1] RNS Inst Technol, Dept Elect & Commun Engn, Bangalore, Karnataka, India
来源
2017 2ND INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, AND COMMUNICATIONS (CCUBE) | 2017年
关键词
Distributed Denial of Service; Ping flooding; TCP SYN flooding; TCP RST attack; UDP flooding; HTTP GET flooding; Rate detection; Port checking; SYN thresholding; RST thresholding;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming the server with malicious traffic. DDoS attacks have become the most tedious and cumbersome issue in recent past. The number and magnitude of attacks have increased from few megabytes of data to 100s of terabytes of data these days. Due to the differences in the attack patterns or new types of attack, it is hard to detect these attacks effectively. In this paper, we devise new techniques for causing DDoS attacks and mitigation which are clearly shown to perform much better than the existing techniques. We also categorize DDoS attack techniques as well as the techniques used in their detection and thus attempt an extensive scoping of the DDoS problem. We also compare our attack module with a couple of tools available.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 50 条
  • [1] A survey of distributed denial-of-service attack, prevention, and mitigation techniques
    Mahjabin, Tasnuva
    Xiao, Yang
    Sun, Guang
    Jiang, Wangdong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12):
  • [2] A detection design for distributed denial of service attack
    Fujita, N
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, : 78 - 82
  • [3] Distributed Detection and Response for the Mitigation of Distributed Denial of Service Attacks
    Grant, D. C.
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 495 - 497
  • [4] Attack Detection of Distributed Denial of Service Based on Splunk
    Su, Te-Jen
    Wang, Shih-Ming
    Chen, Yi-Feng
    Liu, Chao-Liang
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 397 - 400
  • [5] The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack
    Rikhotso, Vukosi
    Velempini, Mthulisi
    AD HOC NETWORKS AND TOOLS FOR IT, ADHOCNETS 2021, 2022, 428 : 63 - 71
  • [6] Implementation of Honeypot to Detect and Prevent Distributed Denial of Service Attack
    Sembiring, Irwan
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2016, : 345 - 350
  • [7] A BitTorrent-driven distributed denial-of-service attack
    Harrington, Jerome
    Kuwanoe, Corey
    Zou, Cliff C.
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 261 - 268
  • [8] WDA: A Web farm Distributed Denial Of Service attack attenuator
    Doron, Ehud
    Wool, Avishai
    COMPUTER NETWORKS, 2011, 55 (05) : 1037 - 1051
  • [9] A Survey on HTTP Flooding-A Distributed Denial of Service Attack
    Khandare, Hrishikesh
    Jain, Saurabh
    Doriya, Rajesh
    PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2022, 2023, 475 : 39 - 52
  • [10] AnubisFlow: A Feature Extractor for Distributed Denial of Service Attack Classification
    Barzilay, Alan
    Martinelli, Caio L.
    Nogueira, Michele
    Batista, Daniel M.
    Hirata, Roberto, Jr.
    PROCEEDINGS OF THE 2021 12TH INTERNATIONAL CONFERENCE ON NETWORK OF THE FUTURE (NOF 2021), 2021,