CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
research
A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks
Authors
J Joshi
D Tipper
ST Zargar
Publication date
1 January 2013
Publisher
'Institute of Electrical and Electronics Engineers (IEEE)'
Doi
Cite
Abstract
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies (i.e., Botnets). Once an attack army has been set up, an attacker can invoke a coordinated, large-scale attack against one or more targets. Developing a comprehensive defense mechanism against identified and anticipated DDoS flooding attacks is a desired goal of the intrusion detection and prevention research community. However, the development of such a mechanism requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various DDoS flooding attacks. In this paper, we explore the scope of the DDoS flooding attack problem and attempts to combat it. We categorize the DDoS flooding attacks and classify existing countermeasures based on where and when they prevent, detect, and respond to the DDoS flooding attacks. Moreover, we highlight the need for a comprehensive distributed and collaborative defense approach. Our primary intention for this work is to stimulate the research community into developing creative, effective, efficient, and comprehensive prevention, detection, and response mechanisms that address the DDoS flooding problem before, during and after an actual attack. © 1998-2012 IEEE
Similar works
Full text
Open in the Core reader
Download PDF
Available Versions
CiteSeerX
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:CiteSeerX.psu:10.1.1.692.9...
Last time updated on 29/10/2017
Name not available
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:d-scholarship.pitt.edu:192...
Last time updated on 15/12/2016
Name not available
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:d-scholarship.pitt.edu:192...
Last time updated on 23/11/2016
Crossref
See this paper in CORE
Go to the repository landing page
Download from data provider
info:doi/10.1109%2Fsurv.2013.0...
Last time updated on 01/04/2019
D-Scholarship@Pitt
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:d-scholarship.pitt.edu:192...
Last time updated on 19/07/2013