CFP last date
20 May 2024
Reseach Article

DDoS Simulation and Hybrid DDoS Defense Mechanism

by Saket Acharya, Nitesh Pradhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 9
Year of Publication: 2017
Authors: Saket Acharya, Nitesh Pradhan
10.5120/ijca2017913736

Saket Acharya, Nitesh Pradhan . DDoS Simulation and Hybrid DDoS Defense Mechanism. International Journal of Computer Applications. 163, 9 ( Apr 2017), 20-24. DOI=10.5120/ijca2017913736

@article{ 10.5120/ijca2017913736,
author = { Saket Acharya, Nitesh Pradhan },
title = { DDoS Simulation and Hybrid DDoS Defense Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 9 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 20-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number9/27424-2017913736/ },
doi = { 10.5120/ijca2017913736 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:09:45.025225+05:30
%A Saket Acharya
%A Nitesh Pradhan
%T DDoS Simulation and Hybrid DDoS Defense Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 9
%P 20-24
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In cyberworld, resource accessibility has a key part in digital security alongside confidentiality and trustworthiness. Distributed Denial of Service (DDoS) attack has turned into an intriguing issue to the availability of assets in computer networks. In this paper, DDoS attacks at different layers of TCP/IP protocol are scrutinized and comparison of existing GUI DDoS tools with a distinct DDoS script is done so as to know the trend of attacking technique used by the assailants to perform an attack.Various defense tools are analyzed and comparison of existing defense mechanism with a distinct hybrid protection methodology is done. This paper aims to provide a superior comprehension of the current DDoS tools, protective mechanisms,and comparative analysis of them.Existing deficiencies in tools and defensive tecniques are examined and reduced to improve the efficiency.

References
  1. Christos Douligeris,Aikaterini Mitrokotsa. 2003 DDoS attacks and defense mechanisms: classification and state-of-the-art Signal Processing and Information Technology 3rd IEEE International Conference,pp-190-193.
  2. Khan Zeb, Owais Baig, Muhammad Kamran Asif 2015 DDOS Attacks and Countermeasures in Cyber SpaceWeb Applications and Networking (WSWAN), 2015 2nd World Conference IEEE,pp-1-6.
  3. Bharti Nagpal,Pratima Sharma,Naresh Chauhan,Angel Panesar. 2015 DDoS Tools: Classification, Analysis and Comparison, Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference IEEE ,pp. 342-346.
  4. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  5. Udaya Kiran Tupakula ,Vijay Varadharajan, Srini Rao Pandalaneni. 2009 DoSTRACK: a system for defending against DoS attacks, ACM Digital Library, pp. 47-53, ISBN: 978-1-60558-166-8.
  6. Mohammed Alenezi, Martin J Reed.2012 Methodologies for detecting DoS/DDoS attacks against network servers, IEEE Journal Of Computing,Volume 45,Issue 1,pp. 1-10
  7. Abdulaziz Aborujilah,Shahrulniza Musa. 2014 Detecting TCP SYN based Flooding Attacks by Analyzing CPU and Network Resources Performance, IEEE Journal Of Computer Security ,Volume 16 ,Issue 3,pp. 3-10.
  8. Vyas Sekar ,Ravishankar Krishnaswamy, Anupam Gupta, Michael K. Reiter. 2010 “Network-wide deployment of intrusion detection and prevention systems”, ACM Digital Library, ISBN: 978-1-4503-0448-1
  9. Iyatiti Mokube, Michele Adams. 2005 Honeypots: concepts, approaches, and challenges, ACM Digital Library, ISBN: 978-1-59593-629-5.
  10. Archana S. Pimpalkar ,A. R. Bhagat Patil 2015 Detection and defense mechanisms against DDoS attacks: A review, IEEE Conference , ISBN: 978-1-4799-6818-3.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber-attack Cyber security DDoS Attack DDoS Attack Tools Vulnerability Mitigation