DDOS Attacks and Possible Countermeasures : A Review
Keywords:
Availability, DOS, DDOS, Attack, SecurityAbstract
The exceptional success & growth of internet has changed many traditional services such as banking, educational, groceries, shopping and many more. Now they are progressively working towards the safe and fast process. The present era, can be said as the era of the internet as the world is highly dependent on the internet which can be considered as the main infrastructure for the growth of global information society. Therefore, the availability of the internet is the perilous for social & economic growth of society. However traditional architecture of the internet is vulnerable which therefore provides the window of opportunity to the lots of the attack. Distributed denial of service (DDoS) attack is one of those attacks, which poses an enormous threat to the availability of the internet. The cloud milieu has many security challenges among which DDoS attacks have maximum priority. Within Cloud Security issues being dominant for the private enterprises, the denial of service attacks is rated as the highest priority threat. One of the immense bother before the researchers is to find the details of attack as many organization avoid to revel that they were attack due to the frighten of the defamation. DDoS exhaust victim’s bandwidth on service. In this paper an overview of distributed-denial-of-service, different types of attack, different types of techniques, and their countermeasures are reviewed.
References
- Douligeris C.and Mitrokotsa A.,"DDoS Attacks and Defense Mechanisms: Classification and State of the Art," Computer Journal Of Networks,vol.44,no.5,pp.643-666,2004.
- Mirkovic J.and Reiher P.,"A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," Computer Journal of ACM SIGCOMM,vol.34,no.2,pp.39-53,2004.
- Peng T.,Leckie C.,and Ramamohanarao K.,"Survey of Network Based Defense Mechanisms Countering the DoS and DDoS Problems,"Computer Journal of ACM Computing Surveys,vol.39,no.1,pp.123-128,2007.
- B.R.Kandukuri,V.R.Paturi,A.Rakshit,Cloud security issues,in: Services Computing,2009.SCC ’09.IEEE International Conference on,2009,pp.517–520,doi: 10.1109/SCC.2009.84 .
- L.M.Kaufman,can public-cloud security meet its unique challenges? IEEE Se-cur Priv 4 (8)(2010)55–57.
- Nilesh A.Suryawanshi S.R.Todmal DDoS Attacks Detection of Application Layer for Web Services using Information based Metrics International Journal of Computer Applications (0975-8887)Volume 117-No.9,May 2015
- Gaurav Somania,M.S.(30 march 2017).DDoS Attacks in Cloud Computing: Issues,Taxonomy,and Future Directions. Elsevier,19.
- Gibson S.,"The Strange Tale of the Denial of Service Attacks Against GRC.COM," http://grc.com/dos/grcdos.htm,2007.
- Monica Sachdeva,Gurvinder Singh,Krishna Kumar and Kuldip Singh," DDoS Incidents and their Impact: A Review",The International Arab Journal of Information Technology,Vol.7,No.1,January 2010
- Howard J.,"An Analysis of Security Incidents on the Internet," PhD Dissertation,Carnegie Mellon University,1997 Statics
- K.Santhi Sri,PRSM Lakshmi," DDoS Attacks,Detection Parameters and Mitigation in Cloud Environment",International Journal for Modern Trends in Science and Technology,Volume: 03,Special Issue No: 01,February 2017
- http://www.bcmpedia.org/wiki/Denial_of_Service
- https://www.us-cert.gov/ncas/tips/ST04-015
- www.incapsula.com/blog/650gbps-DDoS-attack-leet-botnet.html
- https://www.cloudflare.com/learning/DDoS/what-is-a-DDoS-attack
- https://blog.thousandeyes.com/how-to-analyze-DDoS-attackf-dns-infrastructure
- Adrien Bonguet and Martine Bellaiche A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defences in Cloud Computing future internet 2017.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.