CFP last date
20 January 2025
Reseach Article

Mitigation of Distributed Denial of Service (DDoS) Threats

Published on February 2012 by Abhilash C. S., Sunil kumar P. V.
International Conference on Advances in Computational Techniques
Foundation of Computer Science USA
ICACT2011 - Number 1
February 2012
Authors: Abhilash C. S., Sunil kumar P. V.
e4f0189c-bbab-4a03-aa9d-b572b510cea9

Abhilash C. S., Sunil kumar P. V. . Mitigation of Distributed Denial of Service (DDoS) Threats. International Conference on Advances in Computational Techniques. ICACT2011, 1 (February 2012), 1-4.

@article{
author = { Abhilash C. S., Sunil kumar P. V. },
title = { Mitigation of Distributed Denial of Service (DDoS) Threats },
journal = { International Conference on Advances in Computational Techniques },
issue_date = { February 2012 },
volume = { ICACT2011 },
number = { 1 },
month = { February },
year = { 2012 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/icact2011/number1/4768-1101/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Computational Techniques
%A Abhilash C. S.
%A Sunil kumar P. V.
%T Mitigation of Distributed Denial of Service (DDoS) Threats
%J International Conference on Advances in Computational Techniques
%@ 0975-8887
%V ICACT2011
%N 1
%P 1-4
%D 2012
%I International Journal of Computer Applications
Abstract

Denial of Service (DoS) attacks is a kind of attacks against computers connected to the Internet. The goal of DoS attacks is to keep away authorized users from accessing resources. The infected computers may crash or disconnect from the Internet. The distributed denial of service (DDoS) attack is a continuous critical threat that has caused severe damage to servers and will cause even greater intimidation to the development of new Internet services. In the present scenario the mitigation of these attacks has most importance. There are a number of mitigation techniques have been proposed by various researchers. A Web Referral Architecture for Privileged Services (WRAPS) proposed by the authors [8], that can mitigate the DDoS attack that plague website today. It allows a legitimate client to obtain a privileged URL by a referral hyperlink, from a website trusted by the target website. There are several limitations are present in this architecture. WRAPS support only clients that use fixed IP address, instead of as domain names it encodes privileged URLs as IP addresses. If the users want privileged services, then they must access the target site through privileged URL. That means the domain name of server not resolved via DNS and the users must save their privileged URL from the server when it is updated at the end of a privileged period, thus WRAPS not transparent to users.

References
  1. W. J. Blackert, D. M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst, “Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies”. 0-7695-1897-4/03/2003 IEEE.
  2. Abraham Yaar, Adrian Perrig and Dawn Song, “Pi: A Path Identi cation Mechanism to Defend against DDoS Attacks”. Proceedings of the 2003 IEEE Symposium on Security and Privacy, (SP.03).
  3. Cheol-Joo Chae, Seoung-Hyeon Lee, Jae-Seung Lee and Jae-Kwang Lee , “A Study of Defense DDoS Attacks using IP Traceback International Conference on Intelligent Pervasive Computing”. IEEE 2007.
  4. Zhenhai Duan, Xin Yuan, Jaideep Chandrashekar, “Controlling IP Spooing through Interdomain Packet Filters”. IEEE Transactions on dependable and secure computing, vol. 5, no. 1, January-March 2008.
  5. Vrizlynn L. L. Thing, Morris Sloman and Naranker Dulay, “Adaptive Response System for Distributed Denial-of Service Attacks”. Institute for Infocom Research and Imperial College London PhD Thesis, 2008.
  6. M.Nagaratna, Dr. V.Kamakshi Prasad and S.Tanuz Kumar, “Detecting and Preventing IP-spoofed DDoS Attacks by Encrypted Marking based Detection And Filtering (EMDAF)”. International Conference on Advances in Recent Technologies in Communication and Computing, IEEE 2009.
  7. Suriadi Suriadi, Andrew Clark and Desmond Schmidt, “Validating Denial of Service Vulnerabilities in Web Services”. Fourth International Conference on Network and System Security, IEEE 2010
  8. XiaoFeng Wang and Michael K. Reiter, “Using Web-Referral Architectures to Mitigate Denial-of-Service Threats”. IEEE Transactions on dependable and secure computing, vol. 7, no. 2, April-June 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Distributed Denial of Service Denial of Service