CFP last date
20 December 2024
Reseach Article

DDOS and Compilation of Mitigation Techniques

by Ayush Goyal, Palak Baid
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 34
Year of Publication: 2018
Authors: Ayush Goyal, Palak Baid
10.5120/ijca2018916883

Ayush Goyal, Palak Baid . DDOS and Compilation of Mitigation Techniques. International Journal of Computer Applications. 180, 34 ( Apr 2018), 34-39. DOI=10.5120/ijca2018916883

@article{ 10.5120/ijca2018916883,
author = { Ayush Goyal, Palak Baid },
title = { DDOS and Compilation of Mitigation Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2018 },
volume = { 180 },
number = { 34 },
month = { Apr },
year = { 2018 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number34/29269-2018916883/ },
doi = { 10.5120/ijca2018916883 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:02:40.834015+05:30
%A Ayush Goyal
%A Palak Baid
%T DDOS and Compilation of Mitigation Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 34
%P 34-39
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In network communication, attackers often breach the security. Therefore, keeping the data and servers secure is a very crucial task. Among several online attacks, DDOS is the most devastating attack. This attack has the most ravaging effect on the servers. There exists a tremendous pressure on security experts to mitigate the annihilating effects of this attack. In this paper, we have done a comprehensive research on types of DDOS attacks and mitigating its effects. Albeit this attack cannot be fully curbed, it can be extenuated to a certain extent.

References
  1. Darshan Lal Meena, Distributed Denial of Service Attacks and Their Suggested Defense Remedial Approaches, 2014, International Journal of Advance Research in Computer Science and Management Studies, Vol 2, Issue 4
  2. Qijun Gu and Peng Liu. Denial of Service Attacks, February, 2008
  3. Crosby, S. A., and Wallach, D. S. (2003). Denial of Service via Algorithmic Complexity Attacks. Proceedings of the 12th USENIX Security Symposium, 29-44. USENIX Press, Berkeley, CA.
  4. Cowan, C., Beattie, S., Johansen, J., and Wagle. P. (2003). PointGuard: Protecting pointers from buffer overflow vulnerabilities. Proceedings of the 12th USENIX Security.
  5. Dean, D., and Stubblefield, A. (2001). Using client puzzles to protect TLS. Proceedings of the 10th Annual USENIX Security Symposium. USENIX Press, Berkeley, CA.
  6. CERT (1997). CERT Advisory CA-1997-28 IP Denial-of-Service Attacks. Available at: http://www.cert.org/advisories/CA-1997-28.html. (Date of access: August 20, 2006)
  7. Li, J., Mirkovic, J., Wang, M., Reiher, P., and Zhang, L. (2002). Save: source address validity enforcement protocol. Proceedings of IEEE Infocom, 3, 1557-1566. IEEE Press, New York.
  8. Boris Sieklik, Richard J Macfarlane, William J Buchanan, Evaluation of TFTP DDoS amplification attack, Research Gate, October 2015.
  9. Akash Mittal, Prof. Ajit Kumar Shrivastava, Prof. Ajit Kumar Shrivastava , A Review of DDOS Attack and its Countermeasures in TCP Based Networks, 2011, International Journal of Computer Science & Engineering Survey, Vol. 2, No. 4, November 2011.
  10. Dibajyoti Mukhopadhyay, Byung-Jun Oh, Sang-Heon Shim, Young-Chon Kim, A Study on Recent Approaches in Handling DDoS Attacks, December 2010.
  11. Saravanan kumarasamy, Dr.R.Asokan, Distributed Denial of Service (DDoS) Attacks Detection Mechanism, International Journal of Computer Science, Engineering and Information Technology, Vol. 1, No. 5, December 2011.
Index Terms

Computer Science
Information Sciences

Keywords

DOS DDOS IP Spoofing Amplification TCP