2015 2nd World Symposium on Web Applications and Networking (WSWAN) 2015
DOI: 10.1109/wswan.2015.7210322
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attacks and countermeasures in cyberspace

Abstract: In cyberspace, availability of the resources is the key component of cyber security along with confidentiality and integrity. Distributed Denial of Service (DDoS) attack has become one of the major threats to the availability of resources in computer networks. It is a challenging problem in the Internet. In this paper, we present a detailed study of DDoS attacks on the Internet specifically the attacks due to protocols vulnerabilities in the TCP/IP model, their countermeasures and various DDoS attack mechanism… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…The unwanted flood packets, which can cause the failure of network. The attackers consume network bandwidth and CPU usage, as a result, the server cannot serve the users of internet [18]. In this paper, we identify and analyze making and filtering in DoS attacks with packet sniffing.…”
Section: Introductionmentioning
confidence: 99%
“…The unwanted flood packets, which can cause the failure of network. The attackers consume network bandwidth and CPU usage, as a result, the server cannot serve the users of internet [18]. In this paper, we identify and analyze making and filtering in DoS attacks with packet sniffing.…”
Section: Introductionmentioning
confidence: 99%
“…If the CIS is flooded with an overly large number of data requests and/or input throughout the network, the CIS will be unable to cope and will eventually stop functioning and become unavailable to its users. This kind of cyber attack is called Denial-of-Service (DoS) attack [2], [3]. DoS attacks are typically collaborative, and target specific victims (routers, servers, CIS, etc.)…”
Section: Introductionmentioning
confidence: 99%
“…A DRDOS attack is an attack which is achieved through the use of master zombies, slave zombies, and reflectors. Proposed defense mechanisms for this kind of attacks are split into four basic categories, namely attack prevention, attack detection, attack source identification, and attack reaction [2].…”
Section: Introductionmentioning
confidence: 99%
“…At present, under the traditional network environment, methods for defense against DDoS attacks mainly include attack detection and attack response [7]. DDoS Attack detection is based on attack signatures, congestion patterns, protocols, and source addresses as an important basis for detecting attacks, thereby establishing an effective detection mechanism.…”
mentioning
confidence: 99%