Distributed Denial of Service: Attack techniques and mitigation

被引:0
|
作者
Vanitha, K. S. [1 ]
Uma, S. V. [1 ]
Mahidhar, S. K. [1 ]
机构
[1] RNS Inst Technol, Dept Elect & Commun Engn, Bangalore, Karnataka, India
来源
2017 2ND INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, AND COMMUNICATIONS (CCUBE) | 2017年
关键词
Distributed Denial of Service; Ping flooding; TCP SYN flooding; TCP RST attack; UDP flooding; HTTP GET flooding; Rate detection; Port checking; SYN thresholding; RST thresholding;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming the server with malicious traffic. DDoS attacks have become the most tedious and cumbersome issue in recent past. The number and magnitude of attacks have increased from few megabytes of data to 100s of terabytes of data these days. Due to the differences in the attack patterns or new types of attack, it is hard to detect these attacks effectively. In this paper, we devise new techniques for causing DDoS attacks and mitigation which are clearly shown to perform much better than the existing techniques. We also categorize DDoS attack techniques as well as the techniques used in their detection and thus attempt an extensive scoping of the DDoS problem. We also compare our attack module with a couple of tools available.
引用
收藏
页码:226 / 231
页数:6
相关论文
共 50 条
  • [31] Distributed denial of service issues and defense strategies
    Park, J
    WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 1, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT, 2001, : 513 - 516
  • [32] Proactively defeating distributed denial of service attacks
    Fan, YH
    Hassanein, H
    Martin, P
    CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 1047 - 1050
  • [33] A Review of Anomaly Detection Techniques and Distributed Denial of Service (DDoS) on Software Defined Network (SDN)
    Khairi, Mutaz H. H.
    Ariffin, Sharifah H. S.
    Latiff, N. M. Abdul
    Abdullah, A. S.
    Hassan, M. K.
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2018, 8 (02) : 2724 - 2730
  • [34] On the Move: Evading Distributed Denial-of-Service Attacks
    Stavrou, Angelos
    Fleck, Daniel
    Kolias, Constantinos
    COMPUTER, 2016, 49 (03) : 104 - 107
  • [35] Defence for Distributed Denial of Service Attacks in Cloud Computing
    Carlin, Andrew
    Hammoudeh, Mohammad
    Aldabbas, Omar
    INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 : 490 - 497
  • [36] Utilization of blockchain for mitigating the distributed denial of service attacks
    Singh, Rajeev
    Tanwar, Sudeep
    Sharma, Teek Parval
    SECURITY AND PRIVACY, 2020, 3 (03)
  • [37] Research on Detection and Defense Methods for Software-Defined Network Architecture after Hybrid Attack by Distributed Denial of Service
    Xiao, Hongfei
    Xiang, Tao
    Tang, Shiqi
    IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2024, 19 (06) : 1001 - 1006
  • [38] Hybridization of synergistic swarm and differential evolution with graph convolutional network for distributed denial of service detection and mitigation in IoT environment
    Babu, Chukka Ramesh
    Suneetha, M.
    Ahmed, Mohammed Altaf
    Babu, Palamakula Ramesh
    Ishak, Mohamad Khairi
    Alkahtani, Hend Khalid
    Mostafa, Samih M.
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [39] An effective defence mechanism for Distributed Denial-of-Service (DDoS) attacks using router-based techniques
    Kumarasamy, Saravanan
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2010, 6 (01) : 73 - 80
  • [40] A novel Distributed Denial of Service attack defense scheme for Software-Defined Networking using Packet-In message and domain
    Fouladi, Ramin Fadaei
    Karacay, Leyli
    Guelen, Utku
    Soykan, Elif Ustundag
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 120