CFP last date
20 May 2024
Reseach Article

A Comprehensive Study on Distributed Denial of Service Attacks and Defence Mechanisms

Published on October 2014 by Pavithra K. C, Snitha Shetty, Nagesh H. R
International Conference on Information and Communication Technologies
Foundation of Computer Science USA
ICICT - Number 3
October 2014
Authors: Pavithra K. C, Snitha Shetty, Nagesh H. R
ab254799-616c-4170-a58c-c637bc1ca008

Pavithra K. C, Snitha Shetty, Nagesh H. R . A Comprehensive Study on Distributed Denial of Service Attacks and Defence Mechanisms. International Conference on Information and Communication Technologies. ICICT, 3 (October 2014), 15-20.

@article{
author = { Pavithra K. C, Snitha Shetty, Nagesh H. R },
title = { A Comprehensive Study on Distributed Denial of Service Attacks and Defence Mechanisms },
journal = { International Conference on Information and Communication Technologies },
issue_date = { October 2014 },
volume = { ICICT },
number = { 3 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 15-20 },
numpages = 6,
url = { /proceedings/icict/number3/17976-1424/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Information and Communication Technologies
%A Pavithra K. C
%A Snitha Shetty
%A Nagesh H. R
%T A Comprehensive Study on Distributed Denial of Service Attacks and Defence Mechanisms
%J International Conference on Information and Communication Technologies
%@ 0975-8887
%V ICICT
%N 3
%P 15-20
%D 2014
%I International Journal of Computer Applications
Abstract

The advances in information technologies in the internet are increasing the possibility of attacks exponentially. Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are increasing rapidly across the internet world. Denial of Service (DoS) is an attack on availability of a service. The attack aims at denying of an approved service to a legitimate user. When a group of attackers perform DoS attack on a common target, the attack is known as DDoS. The most common method of performing a DoS or a DDoS attacks is to flood the target or network with unwanted traffic, causing interruptions to the communication of legitimate users. The attacks are evolving in a way, the frequency and the severity, sophistication of DDoS attacks are increasing very fast. Existing methods of DoS/DDoS attack, defence mechanisms are outdated and even the latest surveys do not re?ect the signi?cant developments in this area in recent years. This paper will explain, in simple terms, the various types of DDoS attacks and the technologies that are used to prevent and mitigate the attacks. This comprehensive study of attacks and their defence mechanisms would provide the researchers with a better understanding of the problem and the possible solutions.

References
  1. Ferguson, P. and Senie, D. 2000. Network ingress ?ltering: Defeating denial of service attacks which employ IP source address spoo?ng.
  2. Park, K. and Lee, H. 2001b. On the e?ectiveness of router-based packet ?ltering for distributed DoS attack prevention in power-law Internets. In Proceedings of the 2001 ACM SIGCOMM Conference. San Diego, California, USA, 15–26.
  3. Li, J. , Mirkovic, J. , Wang, M. , Reither, P. , and Zhang, L. 2002. Save: Source address validity enforcement protocol. In Proceedings of IEEE INFOCOM 2002. 1557–1566.
  4. Gil, T. M. and Poletto, M. 2001. Multops: a data-structure for bandwidth attack detection. In Proceedings of the 10th USENIX Security Symposium.
  5. Wang, H. , Zhang, D. , and Shin, K. G. 2002. Detecting SYN ?ooding attacks. In Proceedings of IEEE INFOCOM 2002. 1530–1539.
  6. Blazek, R. B. , Kim, H. , Rozovskii, B. , and Tartakovsky, A. 2001. A novel approach to detection of "denial-of-service" attacks via adaptive sequential and batch-sequential change-point detection methods.
  7. C. Cheng , H. T. Kung , Koan-sin Tan. Use of spectral analysis in defense against DoS attacks. In Proceedings of IEEE GLOBECOM 2002. 2143–2148.
  8. Cabrera, J. B. D. , Lewis, L. , Qin, X. , Lee, W. , Prasanth, R. K. Proactive detection of distributed denial of service attacks using MIB tra?c variables - a feasibility study. In Proceedings of the 7th IFIP/IEEE International Symposium on Integrated Network Management. Seattle, WA, 609–622.
  9. Peng, T. , Leckie, C. , and Kotagiri, R. 2004. Proactively detecting distributed denial of service attacks using source ip address monitoring. In Proceedings of the Third International IFIP-TC6 Networking Conference (Networking 2004).
  10. Brodsky, B. E. and Darkhovsky, B. S. 1993. Nonparametric Methods in Change-point Prob- lems. Kluwer Academic Publishers.
  11. Kompella, R. R. , Singh, S. , and Varghese, G. 2004. On scalable attack detection in the network. In IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. ACM Press, New York, NY, USA, 187–200.
  12. Cheng, G. 2006. Malware FAQ: Analysis on DDOS tool Stacheldrahtv1. 666,http://www. sans. org/resources/malwarefaq/stacheldraht. php
  13. Denning, D. E. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 2, 222–232.
  14. Gemberling, B. , Morrow, C. , and Greene, B. 2001. ISP security-real world techniques. Pre- sentation, NANOG. C 2827, the Internet Engineering Task Force (IETF).
  15. Burch, H. and Cheswick, B. 2000. Tracing anonymous packets to their approximate source. In Proceedings of the 14th Systems Administration Conference. New Orleans, Louisiana, USA.
  16. Savage, S. , Wetherall, D. , Karlin, A. , and Anderson, T. 2000. Practical network support for IP traceback. In Proceedings of the 2000 ACM SIGCOMM Conference.
  17. Song, D. X. and Perrig, A. 2001. Advanced and authenticated marking schemes for IP trace- back. In Proceedings of IEEE INFOCOM 2001. 878–886.
  18. Wu, S. F. , Zhang, L. , Massey, D. , and Mankin, A. 2001. Intension-Driven ICMP Trace-Back. IETF Internet Draft.
  19. Snoeren, A. C. , Partridge, C. , Sanchez, L. A. , Jones, C. E. , Tchakountio, F. , Kent, S. T. and Strayer, W. T. 2001. Hash-based IP traceback. In Proceedings of the 2001 ACM SIG-COMM Conference. San Diego, California, USA.
  20. Esraa Alomari, Selvakumar Manickam, " Botnet-based Distributed Denial of Service Attacks on Web Servers:Classification and Art", International Journal of Computer Applications (0975 – 8887) Volume 49– No. 7, July 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Dos Ddos Botnet Defence Ip Spoo?ng.