Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

DDoS Attack Prevention and Mitigation Techniques - A Review

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 67 - Number 19
Year of Publication: 2013
Authors:
Deepika Mahajan
Monika Sachdeva
10.5120/11504-7221

Deepika Mahajan and Monika Sachdeva. Article: DDoS Attack Prevention and Mitigation Techniques - A Review. International Journal of Computer Applications 67(19):21-24, April 2013. Full text available. BibTeX

@article{key:article,
	author = {Deepika Mahajan and Monika Sachdeva},
	title = {Article: DDoS Attack Prevention and Mitigation Techniques - A Review},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {67},
	number = {19},
	pages = {21-24},
	month = {April},
	note = {Full text available}
}

Abstract

The present era is completely dependent on Internet. Internet serves as a global information source for all users, so the availability of internet is very important. In this paper the main focus is on the DDoS attack which hinders the network availability by flooding the victim with high volume of illegitimate traffic usurping its bandwidth, overburdening it to prevent legitimate traffic to get through. Various techniques to prevent and mitigate these attacks along with their advantages and disadvantages are also discussed.

References

  • Tipton H. and Krause M. 2004, Information Security Management Handbook, CRC Press.
  • Sachdeva M. , Singh G. , Kumar K. and Singh K. 2010. DDoS incidents and their impact: A review, International Arab Journal of Information Technology, vol. 7, Issue 1, pp. 14-19.
  • Chang R. K. C. 2002. Defending against flooding-based distributed denial-of-service attacks: A Tutorial, Computer Journal of IEEE Communication Magazine, vol. 40, Issue 10, pp. 42-51.
  • Yau D. K. , Lui J. C. S. , Liang F. 2002. Defending Against Distributed Denial of Service attacks with max–min fair server-centric router throttles, in: Proceedings of the Tenth IEEE International Workshop on Quality of Service (IWQoS), Miami Beach, FL, pp. 35–44.
  • Zhao W. , Olshefski D. , Schulzrinne H. 2000. Internet Quality of Service: an overview, Columbia Technical Report CUCS-003-00.
  • Blake S. , Black D. , Carlson M. , Davies E. , Wang Z. , Weiss W. 1998. An architecture for differentiated services, in: IETF, RFC 2475.
  • Geoffrey M. B. , Xie G. 2002. A feedback mechanism for mitigating Denial of Service attacks against differentiated services clients, In Proceedings of the 10th International Conference on Telecommunications systems, Monterey, CA, pp. 204–213.
  • Ioannidis J. , Bellovin S. M. 2002. Implementing pushback: router-based defense against DDoS Attacks. In Proceedings of Network and Distributed System Security Symposium, (NDSS), San Diego, CA, pp. 6–8.
  • Mankins S. M. , Sangpachatanaruk C. , Znati T. , Melhem R. , Moss D. 2003. Proactive server roaming for mitigating Denial of Service attacks. In Proceedings of 1st International Conference on Information Technology Research and Education (ITRE), Newark, NJ, USA, August 10–13,.
  • Kargl F. , Maier J. , Weber M. 2001. Protecting web servers from Distributed Denial of Service attacks. In Proceedings of the Tenth International Conference on World Wide Web, Hong Kong, pp. 514–524.
  • Ferguson P. , Senie D. 2001. Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing. In RFC 2827.
  • Global Incident analysis Center––Special Notice––Egress filtering, Available from .
  • Park K. , Lee H. 2001. On the effectiveness of route-based packet filtering for Distributed DoS attack prevention in powerlaw Internets, In Proceedings of the ASIGCOMM_01 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM Press, New York, pp. 15–26.
  • Peng T. , Leckie C. , Ramamohanarao K. 2003. Protection from Distributed Denial of Service attack using history-based IP filtering. In Proceedings of IEEE International Conference on Communications, Anchorage, AL, USA.
  • Keromytis A. , Misra V. , Rubenstein D. 2002. SoS: secure overlay services. In Proceedings of the ACM SIGCOMM_02 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM Press, New York, pp. 61–72.
  • Douligeris C. and Mitrokotsa A. 2004. DDoS Attacks and Defense Mechanisms: Classification and State of the Art, Computer Journal of Networks, vol. 44, Issue 5, pp. 643-666.
  • Mirkovic J. , and Reiher P. 2004, A taxonomy of DDoS attack and DDoS defense mechanisms, Computer Journal of ACM SIGCOMM, vol. 34, Issue 2, pp. 39-53.
  • Kumar K. , Joshi R. , and Singh K. 2006, An integrated approach for defending against distributed denial of service attacks, IIT Madras. [Online]. Available: http://www. cs. iitm. ernet. in/~iriss06/paper. html.
  • Peng T. , Leckie C. , and Ramamohanarao K. 2007, Survey of Network Based Defense Mechanism Countering the DoS and DDoS Problems, Computer Journal of ACM Computing Surveys, vol. 39, Issue 1, pp. 123-128.
  • Robinson M. , Mirkovic J. , Schnaider M. , Michel,S. , and Reiher P. 2003, Challenges and Principles of DDoS Defense, Computer Journal of ACM SIGCOMM, vol. 5, Issue 2, pp. 148-152.
  • Lee R. B. , Taxonomies of Distributed Denial of Service networks, attacks, tools and countermeasures, Princeton University, Available from .
  • Weiler N. 2002. Honeypots for Distributed Denial of Service, In Proceedings of the Eleventh IEEE International Workshops Enabling Technologies: Infrastructure for Collaborative Enterprises 2002, Pitsburgh, PA, USA, pp. 109–114.
  • Golubev V. 2005. DoS attacks: crime without penalty[Online]. Available: http://www. crime- research. org/ articles/1049/
  • Sardana A. , Joshi R. 2009. An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation In DDoS attacked network, Computer Communication on Heterogeneous Networking for Quality, Reliability, Security, and Robustness – Part II Elsevier, vol. 32, Issue 12, pp. 1384- 1399.
  • Stein L. D. , Stewart J. N. 2002. The World Wide WebSecurity FAQ, version 3. 1. 2 , Available from .
  • CERT Coordination Center, Denial of Service attacks, Available.
  • Computer Security Institute and Federal Bureau of Investigation 2001, CSI/FBI Computer crime and security survey, CSI, Available from .
  • Moore D. , Voelker G. , Savage S. 2001. Inferring Internet Denial of Service activity, In Proceedings of the USENIX Security Symposium, Washington, DC, USA , pp. 9–22.
  • Yuan J. , Mills K. 2005. Monitoring the macroscopic effects of DDoS flooding Attack, IEEE Transactions on Dependable and secure computing, vol. 2, Issue. 4, pp 324-335.