2013
DOI: 10.5815/ijitcs.2013.08.06
|View full text |Cite
|
Sign up to set email alerts
|

Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

Abstract: Different types and techniques of DDoS attacks & defense are studied in this paper with some recent information on attacks dominated in year 2012 (1st Quarter). We further provide simulation based analysis of an FTP server’s performance in a typical enterprise network under distributed denial of service attack. Simulations in OPNET show noticeable variations in connection capacity, task processing and delay parameters of the attacked server as compared to the performance without attack. DDoS detection and miti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…This infrastructure works around heterogeneous, locally-specific security. Most of these attacks are kind of distributed denial of service attacks (DDoS) [39]. Attempt to provide security against DDoS on Grid is made by Varalakshmi et.al.…”
Section: Related Workmentioning
confidence: 99%
“…This infrastructure works around heterogeneous, locally-specific security. Most of these attacks are kind of distributed denial of service attacks (DDoS) [39]. Attempt to provide security against DDoS on Grid is made by Varalakshmi et.al.…”
Section: Related Workmentioning
confidence: 99%
“…Since malicious traffic now flows to the honey farm, it ensures that the production network is shielded from flooding attacks. Honey VM's in the farm keep the attacker engaged through a set of challenge-response queries further slowing down the attacker [19]. Also, once the attack source is confirmed, all incoming traffic from that source is blocked at the firewall itself.…”
Section: B Preventing Flooding Attacksmentioning
confidence: 99%
“…For this, the honey VM then employs a challenge-response model to gather more information. This is accomplished by sending a set of challenge queries to suspicious source [19]. Based on the responses received, the honey VM decides whether further investigation is necessary.…”
Section: A Detection Of An Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…We find some comprehensive papers & articles to enrich our literature review on the topic [1][2][3][4][5][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. Some reviewed methods have also been referred in tables of first author's previous work [30]; however this paper contains major changes as compared to the previous study. Discussion on Prolexic attack report of year 2012 quarter 1 and performance evaluation in OPNET simulator constitute a significant part of previous publication whereas they have not been covered in this paper.…”
Section: Ddos Detection and Mitigationmentioning
confidence: 99%