Computer Sciences


A Study on Preventive Methods used for Distributed Denial of Service Attacks

Article Number: BHY279656 Volume 01 | Issue 01 | January - 2019 ISSN: UA
10th Sep, 2018
27th Oct, 2018
28th Dec, 2018
07th Jan, 2019

Authors

Vaivbhav Tyagi, Umakant Dwivedi

Abstract

In today’s scenario, Denial of Service (DoS) has become an extortion weapon and casing damage to multiple internet user. DDoS attacks rates are increasing in an exponential style and a report represented rate of DDoS attack i.e. 300GB per second. In 2000, very famous Amazon, Yahoo and CNN also developed the major targets of attack of DDoS and it’s an alarming sign that DDoS attacks rate will definitely increase in coming year. To overcome with this problem numerous preventive techniques has been proposed. Here in this paper, an effort has been done on the recent preventive techniques used for Distributed Denial of Service (DDoS) attacks as internet security has always been a concern for internet user. Keywords: DoS, DDoS, Preventive Techniques for DDoS,

Introduction

In current scenario, internet considered as the significant part for every individual in different ways due to which cyberspace attacks has also been increased. For instance, Information Phishing, Denial of Service, Email Spamming, Financial Fraud, etc. among numerous internet based attacks Denial of Service is considered as very serious and continuous threat in the world of cyber security. Denial-Of-Service is defined as an attack targeted for divesting genuine users with the online services, it is caused by overflowing the network or server with invalid authentication requests which ultimately down the server or network. And when the attacks of DoS are systematized by various dispersed computers, they commonly known as DDoS attack (Distributed Denial of Service). DDoS attack is termed as the of the most widespread attack in the world of cyber and the targets are, Links, Victim’s OS Firewalls and defense systems, Routers, Victim’s Application, Victim’s Infrastructure and Current Communication. Basically different types of attacks of DDoS i.e. Network-centric or volumetric attacks, protocol attacks target network layer or transport layer protocols and application layer attacks. The inundation of packets at the target causes a denial of service. In 1988, only six DDoS attack were recorded but the number of attacks increasing with every passing day.

References

Yu, Shui. Distributed Denial of Service Attack and Defense. Springer, 2014.

“Definition of Denial-of-Service Attack | What Is Denial-of-Service Attack? Denial-of-Service Attack Meaning.” The Economic Times, Economic Times, Available at: economictimes.indiatimes.com/definition/denial-of-service-attack.

“What Is Distributed Denial of Service (DDoS) Attack? - Definition from WhatIs.com.” SearchSecurity, TechTarget, Available at: https://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack.

Bhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. CRC Press, 2016.

Mahajan, Deepika, and Monika Sachdeva. “DDoS Attack Prevention and Mitigation Techniques - A Review.” International Journal of Computer Applications, vol. 67, no. 19, 2013, pp. 21–24.

Priyadharshini, V., and K. Kuppusamy. “Prevention of DDOS Attacks Using New Cracking Algorithm.” International Journal of Engineering Research and Applications (IJERA) I, vol. 2, no. 3, 2012, pp. 2263–2267.

Elleithy, Khaled M., et al. “Denial of Service Attack Techniques: Analysis, Implementation and Comparison.” Research Gate, Available at:

Comparison/links/0deec522bc76abe6d7000000/Denial-of-Service-Attack-Techniques-Analysis-Implementation-and-Comparison.pdf

Francois, Jérôme, et al. “FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks.” IEEE/ACM Transactions on Networking, vol. 20, no. 6, 2012, pp. 1828–1841.

Gupta, B. B., et al. “An ISP Level Solution to Combat DDoS Attacks Using Combined Statistical Based Approach .” Journal of Information Assurance and Security , vol. 2, 2 June 2008, pp. 102–110.

Yu, Shui, and Wanlei Zhou. “Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks.” 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008.

Kim, Mihui, et al. “A Combined Data Mining Approach for DDoS Attack Detection.” Lecture Notes in Computer Science Information Networking. Networking Technologies for Broadband and Mobile Networks, 2004, pp. 943–950. 

Lu, Kejie, et al. “Robust and Efficient Detection of DDoS Attacks for Large-Scale Internet.” Computer Networks, vol. 51, no. 18, 2007, pp. 5036–5056.

Bhange, Anup, et al. “DDoS Attacks Impact on Network Traffic and Its Detection Approach.” International Journal of Computer Applications, vol. 40, no. 11, 2012, pp. 36–40.

Kumarasamy, Saravanan. “Distributed Denial of Service (DDOS) Attacks Detection Mechanism.” International Journal of Computer Science, Engineering and Information Technology, vol.

1, no. 5, 2011, pp. 39–49. Devi, S Renuka. “Detection of Application Layer DDOS Attacks Using Information Theory Based Metrics.” 

Computer Science & Information Technology (CS & IT), 2012. 

DMBisson, David BissonFollow. “The 5 Most Significant DDoS Attacks of 2016.” The State of Security, 29 Nov. 2016, Available at: www.tripwire.com/state-of-security/security-data-protection/cybersecurity/5-significant-ddos-attacks-2016/.

 Hussain, A., et al. “Identification of Repeated Denial of Service Attacks.” Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. 

Zlomislić, Vinko, et al. “Denial of Service Attacks, Defences and Research Challenges.” Cluster Computing, vol. 20, no. 1, 2017, pp. 661–671.

How to cite this article?

APA StyleTyagi, V., & Dwivedi, U. (2019). A Study on Preventive Methods used for Distributed Denial of Service Attacks. Academic Journal of Computer Sciences, 1(1), 18-22.
Chicago Style
MLA Style
DOI
URL

Create Your Password

We've sent a link to create password on your registered email, Click the link in email to start using Xournal.

Sign In

Forgot Password?
Don't have an account? Create Account

Create Account

Already have an account? Sign In

Forgot Password

Do you want to try again? Sign In

Publication Tracking