DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms - A Survey
DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms - A Survey
Article PDF

Keywords

denial of service (DoS)
distributed denial of service (DDoS)
detection mechanisms and trceback approaches

How to Cite

K.Munivara Prasad. (2014). DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms - A Survey. Global Journal of Computer Science and Technology, 14(E7), 15–32. Retrieved from https://gjcst.com/index.php/gjcst/article/view/1165

Abstract

Denial of Service DoS or Distributed Denial of Service DDoS attacks are typically explicit attempts to exhaust victim s bandwidth or disrupt legitimate users access to services Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to gain access to a large number of compromised computers by exploiting their vulnerabilities to set up attack networks or Botnets Once attack network or Botnet has been set up an attacker invokes a large-scale coordinated attack against one or more targets Asa result of the continuous evolution of new attacks and ever-increasing range of vulnerable hosts on the internet many DDoS attack Detection Prevention and Traceback mechanisms have been proposed In this paper we tend to surveyed different types of attacks and techniques of DDoS attacks and their countermeasures The significance of this paper is that the coverage of many aspects of countering DDoS attacks including detection defence and mitigation traceback approaches open issues and research challenges
Article PDF
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright (c) 2014 Authors and Global Journals Private Limited