2015
DOI: 10.1109/comst.2015.2457491
|View full text |Cite
|
Sign up to set email alerts
|

Botnet in DDoS Attacks: Trends and Challenges

Abstract: Threats of Distributed Denial of Service (DDoS) attacks have been increasing day-by-day due to rapid development of computer networks and associated infrastructure, and millions of software applications, large and small, addressing all varieties of tasks. Botnets pose a major threat to network security as they are widely used for many Internet crimes such as DDoS attacks, identity theft, email spamming and click fraud. Botnet based DDoS attacks are catastrophic to the victim network as they can exhaust both ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
110
0
8

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 222 publications
(118 citation statements)
references
References 104 publications
(87 reference statements)
0
110
0
8
Order By: Relevance
“…We redirect the Reader to [5] for a more comprehensive summary. Statistical methods for DDoS attack identification are proposed in [6], with focus on the detection of anomalies in the characteristics (e.g., entropy, relative frequencies) of selected packet attributes.…”
Section: A Related Workmentioning
confidence: 99%
“…We redirect the Reader to [5] for a more comprehensive summary. Statistical methods for DDoS attack identification are proposed in [6], with focus on the detection of anomalies in the characteristics (e.g., entropy, relative frequencies) of selected packet attributes.…”
Section: A Related Workmentioning
confidence: 99%
“…DDOS attacks launched at the application layer require lower bandwidth to prevent legitimate users from surfing a web server, apart from mimicking traffic close to the authentic traffic [12]. e three factors that make DDOS detection difficult at the application layer are as follows [13]: (1) obscurity, HTTP protocol uses Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) connections to run its operation, hence the intricacy to differentiate legitimate from illegitimate traffic; (2) efficiency, HTTP DDOS attack only requires fewer connections to initiate a DDOS attack; and (3) lethality, the capability of the attack to overwhelm a web server immediately, thus resulting in service breakdown regardless of the type of hardware and its performance.…”
Section: Introductionmentioning
confidence: 99%
“…Another form of DoS attack is the Distributed Denial of Service (DDoS). DDoS attacks are usually launched with the aid of botnets [5]. A botnet is a set of compromised hosts controlled by a malicious attacker, which are instructed to perform illegal and malicious actions.…”
Section: Introductionmentioning
confidence: 99%