CFP last date
20 December 2024
Reseach Article

Crossfire DoS Attack and its Defence Mechanism

by Sumer Shende
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 3
Year of Publication: 2015
Authors: Sumer Shende
10.5120/ijca2015907313

Sumer Shende . Crossfire DoS Attack and its Defence Mechanism. International Journal of Computer Applications. 132, 3 ( December 2015), 9-11. DOI=10.5120/ijca2015907313

@article{ 10.5120/ijca2015907313,
author = { Sumer Shende },
title = { Crossfire DoS Attack and its Defence Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 3 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number3/23572-2015907313/ },
doi = { 10.5120/ijca2015907313 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:28:07.624110+05:30
%A Sumer Shende
%T Crossfire DoS Attack and its Defence Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 3
%P 9-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Denial of Service (DoS) attacks represent a noteworthy danger to Internet users and administrations. Network threats are growing throughout the years, new sorts of DoS threats develop. One of such DoS attack is the Crossfire attack which is of extreme threat. In Crossfire, bots directs low intensity flows to a large number of servers. This paper presents a possible solution to this attack.

References
  1. Defense and Monitoring Model for Distributed Denial of Service Attacks. Article Procedia Computer Science, Volume 10, 2012, Pages 1052-1056
  2. Poseidon: Mitigating Interest Flooding DDoSAttacks in Named Data Networking. 978-1-4799-0537-9/13 IEEE pg 630-638 ©2013
  3. The Crossfire Attack, 2013 IEEE Symposium on Security and Privacy. 1081-6011/13 $26.00 © 2013 IEEE. DOI 10.1109/SP.2013.19
  4. A distributed detecting method for SYN flood attacks and its implementation using mobile agents MATES'09 Proceedings of the 7th German conference on Multiagent system technologies Pages 91-102.
  5. Cross-domain DoS link-flooding attack detection and mitigation using SDN principles. Master Thesis MA-2013-18
  6. DDoS Attack Detection Using Fast Entropy Approach on Flow- Based Network TrafficOriginal Research Article. Procedia Computer Science, Volume 50, 2015, Pages 30-36.
Index Terms

Computer Science
Information Sciences

Keywords

Crossfire attack denial of service attack network flooding.