2021
DOI: 10.11591/ijece.v11i6.pp5327-5341
|View full text |Cite
|
Sign up to set email alerts
|

Distributed reflection denial of service attack: A critical review

Abstract: As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 39 publications
0
8
0
Order By: Relevance
“…The detection model, underpinning this research, underwent comprehensive training, testing, and evaluation phases using this dataset. Despite the absence of explicit dataset details in the referenced link, the publication is presumed to delineate the dataset's characteristics and composition [22]. The dataset is characterized by the following attributes:…”
Section: Results and Analysismentioning
confidence: 99%
“…The detection model, underpinning this research, underwent comprehensive training, testing, and evaluation phases using this dataset. Despite the absence of explicit dataset details in the referenced link, the publication is presumed to delineate the dataset's characteristics and composition [22]. The dataset is characterized by the following attributes:…”
Section: Results and Analysismentioning
confidence: 99%
“…Cybersecurity researchers say DDoS attacks have become more common in recent years. DDoS attacks have also significantly impacted the functioning of companies and organizations worldwide, causing financial and technical damage due to their destructive effect while sabotaging DNS infrastructure [73]. The DNS amplification attack is more popular than other DNS attacks because the attacker prefers attacks with a high effect and a low cost.…”
Section: Resultsmentioning
confidence: 99%
“…This type of attack is classified into two types based on the protocol used in the attack: TCP-based DRDoS assault and UDP-based DRDoS assault, which consists of two parts: amplification and reflection [73]. As a result, some attacks are protocol-dependent, while others are protocol-independent.…”
Section: A the Mechanics Of Drdos Attacksmentioning
confidence: 99%
“…This increases the attack bandwidth and the likelihood that a denial of service outage will result from the attack. DNS, NTP, SNMP, and SSDP are the protocols for UDP-based DRDoS attacks; SYN and BGP are the protocols for TCP-based DRDoS attacks [ 178 ]. Firewalls, intrusion detection systems, machine learning, etc.…”
Section: Devices’ Vulnerabilities and Requirementsmentioning
confidence: 99%