CFP last date
20 December 2024
Reseach Article

DDOS Protection by Dividing and Limiting

by Harshil Shah, Priyansh Shah, Swapna Naik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 11
Year of Publication: 2016
Authors: Harshil Shah, Priyansh Shah, Swapna Naik
10.5120/ijca2016912251

Harshil Shah, Priyansh Shah, Swapna Naik . DDOS Protection by Dividing and Limiting. International Journal of Computer Applications. 155, 11 ( Dec 2016), 12-14. DOI=10.5120/ijca2016912251

@article{ 10.5120/ijca2016912251,
author = { Harshil Shah, Priyansh Shah, Swapna Naik },
title = { DDOS Protection by Dividing and Limiting },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 11 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 12-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume155/number11/26648-2016912251/ },
doi = { 10.5120/ijca2016912251 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:00:59.505527+05:30
%A Harshil Shah
%A Priyansh Shah
%A Swapna Naik
%T DDOS Protection by Dividing and Limiting
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 11
%P 12-14
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

DDOS attacks have increased lately to an extent where large companies have lost millions. They pose a large threat to internet security. This paper explains DOS and DDOS attacks and their types as well as two computer softwares – LOIC and DDOSIM - to launch DDOS attacks and the history of the well-known botnets and DDOS attacks. A solution for DDOS protection at application layer is also proposed. It explores the combination of various tools and techniques like ingress filtering, IP address blacklist checker and dividing the server as a measure to limit the attacks.

References
  1. Ukasz Apiecionek, Wojciech Makowski. “Firewall rule with token bucket as a DDOS tool”, in Proc. IEEE, 2015, pp. 32-35.
  2. Karl Thomas. “Nine bad botnets and the damage they did.”Internet:http://www.welivesecurity.com/2015/02/25/nine-bad-botnets-damage/, 25 feb 2015.
  3. Deepankar Varma. “LOIC (Low Orbit Ion Canon) – DOS attacking tool.” Internet: http://resources.infosecinstitute.com/loic-dos-attacking-tool/, 20 dec 2011.
  4. Groove group’s blog. “Application layer DDOS simulatorddosimv.02.”Internet:https://thegrovegroup.wordpress.com/2010/12/18/application-layer-ddos-simulator-ddosim-v0-2/, 19 dec 2010.
  5. Mathew Haughn. “Ingress filtering.” Internet: http://whatis.techtarget.com/definition/ingress-filtering, june 2015.
  6. Asheeta Regidi. “Internet service providers in Mumbai targeted in DDOS attack.” Internet: http://tech.firstpost.co m/news-analysis/internet-service-providers-in-mumbai-targeted-in-ddos-attack-326708.html, 25 jul 2016.
  7. Geetha Nandikotkur. “India launches most DDOS attack.”Internet:http://www.bankinfosecurity.in/india-launches-most-ddos-attacks-a-7512, 31 oct 2014.
  8. PluralsightIT. “Ethical hacking – Types of DOS attacks.”Internet:https://www.youtube.com/watch?v=7VMvo0-qLl0, 15 may 2012.
  9. JackTutorials. “Explained! #1 – What is Botnet.” Internet: https://www.youtube.com/watch?v=ahynBPv58n8, 10 may 2015.
Index Terms

Computer Science
Information Sciences

Keywords

DOS DDOS ingress filtering dividing IP blacklist LOIC DDOSIM botnet.