Title | DDoS Attack using SYN Flooding: A Case Study |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Kukreti, Sambhavi, Modgil, Sumit Kumar, Gehlot, Neha, Kumar, Vinod |
Conference Name | 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) |
Keywords | Botnet, composability, Covid, Cyberspace, DDoS attack mitigation, denial-of-service attack, Distributed Denial of Service (DDoS), Floods, Human Behavior, Internet, Malware, metasploit, Metrics, mitigation techniques, pubcrawl, resilience, Resiliency, security, SYN Flooding Attack, telecommunication traffic, Wireshark |
Abstract | Undoubtedly, technology has not only transformed our world of work and lifestyle, but it also carries with it a lot of security challenges. The Distributed Denial-of-Service (DDoS) attack is one of the most prominent attacks witnessed by cyberspace of the current era. This paper outlines several DDoS attacks, their mitigation stages, propagation of attacks, malicious codes, and finally provides redemptions of exhibiting normal and DDoS attacked scenarios. A case study of a SYN flooding attack has been exploited by using Metasploit. The utilization of CPU frame length and rate have been observed in normal and attacked phases. Preliminary results clearly show that in a normal scenario, CPU usage is about 20%. However, in attacked phases with the same CPU load, CPU execution overhead is nearly 90% or 100%. Thus, through this research, the major difference was found in CPU usage, frame length, and degree of data flow. Wireshark tool has been used for network traffic analyzer. |
DOI | 10.23919/INDIACom54597.2022.9763108 |
Citation Key | kukreti_ddos_2022 |