2019
DOI: 10.1080/13614576.2019.1611468
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Denial of Service Attacks: A Threat or Challenge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 76 publications
0
7
0
Order By: Relevance
“…These devices are infected with malware to manipulate them from a remote region outside the control of their valid proprietors. These botnet devices are used for illicit purposes, such as for junk mail or DDoS attacks [2]. DDoS can likewise be applied as a smokescreen for malicious activities and attack safety apparatuses, attacking the target's safety.…”
Section: Zombies In the Ddos Contextmentioning
confidence: 99%
“…These devices are infected with malware to manipulate them from a remote region outside the control of their valid proprietors. These botnet devices are used for illicit purposes, such as for junk mail or DDoS attacks [2]. DDoS can likewise be applied as a smokescreen for malicious activities and attack safety apparatuses, attacking the target's safety.…”
Section: Zombies In the Ddos Contextmentioning
confidence: 99%
“…Cloud computing is a new level of networking since it offers limitless processing capacity and storage, which poses security concerns [20]. Cyber-attacks such as distributed denial of service (DDoS) attacks that deliver harmful packets [26] and phishing attempts that trick users on banking and shopping sites have increased dramatically. Furthermore, attackers are increasingly deploying malicious attack software (viruses, worms, trojans, spyware, and ransomware) that is installed on a user's computer without their knowledge or agreement [28].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The main goal of a reflector attack is to mask the identity of the real attacker through the use of third-party "reflectors" and then to benefit from their resources [31]. The attacker initiates an attack from zombie machines and instructs them to send traffic toward the target through third parties with the victim's IP address [32]. All the reflectors reply to the victim, while the original request comes from the attacking source, thus causing a huge amount of malicious traffic that consumes the target network resources [33].…”
Section: Reflector Attacksmentioning
confidence: 99%