A survey of distributed denial of service attack
Title | A survey of distributed denial of service attack |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Mallikarjunan, K. N., Muthupriya, K., Shalinie, S. M. |
Conference Name | 2016 10th International Conference on Intelligent Systems and Control (ISCO) |
Publisher | IEEE |
ISBN Number | 978-1-4673-7807-9 |
Keywords | botnets, cloud computing, Computer crime, computer network security, DDoS, DDoS attack detection strategies, distributed denial of service attack, Floods, Human Behavior, human factors, Information security, interconnected systems, IP networks, Metrics, Protocols, pubcrawl, Resiliency, resources, server, Servers, TCP, UDP, video surveillance |
Abstract | Information security deals with a large number of subjects like spoofed message detection, audio processing, video surveillance and cyber-attack detections. However the biggest threat for the homeland security is cyber-attacks. Distributed Denial of Service attack is one among them. Interconnected systems such as database server, web server, cloud computing servers etc., are now under threads from network attackers. Denial of service is common attack in the internet which causes problem for both the user and the service providers. Distributed attack sources can be used to enlarge the attack in case of Distributed Denial of Service so that the effect of the attack will be high. Distributed Denial of Service attacks aims at exhausting the communication and computational power of the network by flooding the packets through the network and making malicious traffic in the network. In order to be an effective service the DDoS attack must be detected and mitigated quickly before the legitimate user access the attacker's target. The group of systems that is used to perform the DoS attack is known as the botnets. This paper introduces the overview of the state of art in DDoS attack detection strategies. |
URL | https://ieeexplore.ieee.org/document/7727096/ |
DOI | 10.1109/ISCO.2016.7727096 |
Citation Key | mallikarjunan_survey_2016 |
- Interconnected Systems
- video surveillance
- UDP
- TCP
- Servers
- server
- resources
- Resiliency
- pubcrawl
- Protocols
- Metrics
- IP networks
- botnets
- information security
- Human Factors
- Human behavior
- Floods
- distributed denial of service attack
- DDoS attack detection strategies
- DDoS
- computer network security
- Computer crime
- Cloud Computing