CFP last date
22 April 2024
Reseach Article

DDoS Attack Prevention and Mitigation Techniques - A Review

by Deepika Mahajan, Monika Sachdeva
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 19
Year of Publication: 2013
Authors: Deepika Mahajan, Monika Sachdeva
10.5120/11504-7221

Deepika Mahajan, Monika Sachdeva . DDoS Attack Prevention and Mitigation Techniques - A Review. International Journal of Computer Applications. 67, 19 ( April 2013), 21-24. DOI=10.5120/11504-7221

@article{ 10.5120/11504-7221,
author = { Deepika Mahajan, Monika Sachdeva },
title = { DDoS Attack Prevention and Mitigation Techniques - A Review },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 19 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number19/11504-7221/ },
doi = { 10.5120/11504-7221 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:25:53.104893+05:30
%A Deepika Mahajan
%A Monika Sachdeva
%T DDoS Attack Prevention and Mitigation Techniques - A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 19
%P 21-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The present era is completely dependent on Internet. Internet serves as a global information source for all users, so the availability of internet is very important. In this paper the main focus is on the DDoS attack which hinders the network availability by flooding the victim with high volume of illegitimate traffic usurping its bandwidth, overburdening it to prevent legitimate traffic to get through. Various techniques to prevent and mitigate these attacks along with their advantages and disadvantages are also discussed.

References
  1. Tipton H. and Krause M. 2004, Information Security Management Handbook, CRC Press.
  2. Sachdeva M. , Singh G. , Kumar K. and Singh K. 2010. DDoS incidents and their impact: A review, International Arab Journal of Information Technology, vol. 7, Issue 1, pp. 14-19.
  3. Chang R. K. C. 2002. Defending against flooding-based distributed denial-of-service attacks: A Tutorial, Computer Journal of IEEE Communication Magazine, vol. 40, Issue 10, pp. 42-51.
  4. Yau D. K. , Lui J. C. S. , Liang F. 2002. Defending Against Distributed Denial of Service attacks with max–min fair server-centric router throttles, in: Proceedings of the Tenth IEEE International Workshop on Quality of Service (IWQoS), Miami Beach, FL, pp. 35–44.
  5. Zhao W. , Olshefski D. , Schulzrinne H. 2000. Internet Quality of Service: an overview, Columbia Technical Report CUCS-003-00.
  6. Blake S. , Black D. , Carlson M. , Davies E. , Wang Z. , Weiss W. 1998. An architecture for differentiated services, in: IETF, RFC 2475.
  7. Geoffrey M. B. , Xie G. 2002. A feedback mechanism for mitigating Denial of Service attacks against differentiated services clients, In Proceedings of the 10th International Conference on Telecommunications systems, Monterey, CA, pp. 204–213.
  8. Ioannidis J. , Bellovin S. M. 2002. Implementing pushback: router-based defense against DDoS Attacks. In Proceedings of Network and Distributed System Security Symposium, (NDSS), San Diego, CA, pp. 6–8.
  9. Mankins S. M. , Sangpachatanaruk C. , Znati T. , Melhem R. , Moss D. 2003. Proactive server roaming for mitigating Denial of Service attacks. In Proceedings of 1st International Conference on Information Technology Research and Education (ITRE), Newark, NJ, USA, August 10–13,.
  10. Kargl F. , Maier J. , Weber M. 2001. Protecting web servers from Distributed Denial of Service attacks. In Proceedings of the Tenth International Conference on World Wide Web, Hong Kong, pp. 514–524.
  11. Ferguson P. , Senie D. 2001. Network ingress filtering: defeating Denial of Service attacks which employ IP source address spoofing. In RFC 2827.
  12. Park K. , Lee H. 2001. On the effectiveness of route-based packet filtering for Distributed DoS attack prevention in powerlaw Internets, In Proceedings of the ASIGCOMM_01 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM Press, New York, pp. 15–26.
  13. Peng T. , Leckie C. , Ramamohanarao K. 2003. Protection from Distributed Denial of Service attack using history-based IP filtering. In Proceedings of IEEE International Conference on Communications, Anchorage, AL, USA.
  14. Keromytis A. , Misra V. , Rubenstein D. 2002. SoS: secure overlay services. In Proceedings of the ACM SIGCOMM_02 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM Press, New York, pp. 61–72.
  15. Douligeris C. and Mitrokotsa A. 2004. DDoS Attacks and Defense Mechanisms: Classification and State of the Art, Computer Journal of Networks, vol. 44, Issue 5, pp. 643-666.
  16. Mirkovic J. , and Reiher P. 2004, A taxonomy of DDoS attack and DDoS defense mechanisms, Computer Journal of ACM SIGCOMM, vol. 34, Issue 2, pp. 39-53.
  17. Kumar K. , Joshi R. , and Singh K. 2006, An integrated approach for defending against distributed denial of service attacks, IIT Madras. [Online]. Available: http://www. cs. iitm. ernet. in/~iriss06/paper. html.
  18. Peng T. , Leckie C. , and Ramamohanarao K. 2007, Survey of Network Based Defense Mechanism Countering the DoS and DDoS Problems, Computer Journal of ACM Computing Surveys, vol. 39, Issue 1, pp. 123-128.
  19. Robinson M. , Mirkovic J. , Schnaider M. , Michel,S. , and Reiher P. 2003, Challenges and Principles of DDoS Defense, Computer Journal of ACM SIGCOMM, vol. 5, Issue 2, pp. 148-152.
  20. Weiler N. 2002. Honeypots for Distributed Denial of Service, In Proceedings of the Eleventh IEEE International Workshops Enabling Technologies: Infrastructure for Collaborative Enterprises 2002, Pitsburgh, PA, USA, pp. 109–114.
  21. Golubev V. 2005. DoS attacks: crime without penalty[Online]. Available: http://www. crime- research. org/ articles/1049/
  22. Sardana A. , Joshi R. 2009. An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation In DDoS attacked network, Computer Communication on Heterogeneous Networking for Quality, Reliability, Security, and Robustness – Part II Elsevier, vol. 32, Issue 12, pp. 1384- 1399.
  23. Moore D. , Voelker G. , Savage S. 2001. Inferring Internet Denial of Service activity, In Proceedings of the USENIX Security Symposium, Washington, DC, USA , pp. 9–22.
  24. Yuan J. , Mills K. 2005. Monitoring the macroscopic effects of DDoS flooding Attack, IEEE Transactions on Dependable and secure computing, vol. 2, Issue. 4, pp 324-335.
Index Terms

Computer Science
Information Sciences

Keywords

DDoS attack Availability Zombie Botnet