CFP last date
20 December 2024
Reseach Article

Current Trends in Detection and Mitigation of Denial of Service Attacks - A Survey

Published on October 2014 by Shishira S R, Vasudeva Pai, Manamohan K
International Conference on Information and Communication Technologies
Foundation of Computer Science USA
ICICT - Number 5
October 2014
Authors: Shishira S R, Vasudeva Pai, Manamohan K
3eb28b85-4449-4437-a5ec-86696032dd69

Shishira S R, Vasudeva Pai, Manamohan K . Current Trends in Detection and Mitigation of Denial of Service Attacks - A Survey. International Conference on Information and Communication Technologies. ICICT, 5 (October 2014), 13-16.

@article{
author = { Shishira S R, Vasudeva Pai, Manamohan K },
title = { Current Trends in Detection and Mitigation of Denial of Service Attacks - A Survey },
journal = { International Conference on Information and Communication Technologies },
issue_date = { October 2014 },
volume = { ICICT },
number = { 5 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 13-16 },
numpages = 4,
url = { /proceedings/icict/number5/17995-1450/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Information and Communication Technologies
%A Shishira S R
%A Vasudeva Pai
%A Manamohan K
%T Current Trends in Detection and Mitigation of Denial of Service Attacks - A Survey
%J International Conference on Information and Communication Technologies
%@ 0975-8887
%V ICICT
%N 5
%P 13-16
%D 2014
%I International Journal of Computer Applications
Abstract

Denial of Service (DoS) attack is a threat in today's network because DoS attacks are easy to launch, while defending a network resource against them is very difficult. DoS attack is an attempt to make a machine or network resource unavailable to its legitimate users. It has put tremendous pressure over security experts in bringing out effective defense solutions. These attacks could be implemented with variety of tools and codes. Large number of countermeasure techniques tries to detect the attack and filter it out. In this paper a study is made on recent techniques on Denial of Service protection. Our discussion aims to identify the current methods in detection and mitigation of DoS attacks in the network.

References
  1. Saman Taghavi Zargar, Member, IEEE, James Joshi, Member, IEEE, and David Tipper, Senior Member, IEEE,"A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks"
  2. SANS Institute. Subramani rao Sridhar rao ,"Denial of Service attacks and mitigation techniques: Real time implementation with detailed analyis" The SANS Institute,2011.
  3. Forrester Consulting, The trends and changing landscape of DDoS threats and protection, a commissioned study conducted by Forrester Consulting on behalf of VeriSign, Inc. , July 2009.
  4. Erikson, Jon (2008). HACKING the art of exploitation (2nd edition Ed. ). San Francisco:No Starch Press. p. 251. ISBN 1-59327-144-1.
  5. Yun Liu et al. ,'Detecting DDoS Attacks Using Conditional Entropy', IEEE 2010.
  6. Je Hak Lee ,Dong Seong Kim ,Sang Min Lee ,Jong Sou Park, 'DDoS Attacks Detection Using GA based Optimized Traffic Matrix',2011 IEEE Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
  7. CaLynna Sorrells and Lijun Qian Husheng Li,"Quickest detection of denial-of-service attacks in cognitive wireless networks" ACM, 2012.
  8. Divya Bansal, Sanjeev Sofat, "Use of cross layer interactions for detecting denial of service attacks in WMN",2010.
  9. B. S. Kiruthika Devi, G. Preetha, S. Mercy Shalinie,"DDoS detection using host-network based metrics and mitigation in experimental testbed", IEEE, 2012.
  10. Cornel Barna, Mark Shtern, Michael Smit, Vassilios Tzerpos, Marin Litoiu York University,"Model-based adaptive DoS attack mitigation", ACM, 2012.
  11. Jing Yang Koh, Joseph Teo Chee Ming, and Dusit Niyato ,"Rate limiting client puzzle schemes for Denial-of-Service mitigation", IEEE 2013.
  12. Hakem Beitollahi, Geert Deconinck, Katholieke Universiteit Leuven, Belgium "FOSeL: Filtering by helping an overlay security layer to mitigate DoS attacks", IEEE, 2008.
  13. David L,Meenakshi Sood,Mahesh Kumar Kajla,"Router based approach to mitigate DoS attacks on the wireless networks,IEEE,2011.
Index Terms

Computer Science
Information Sciences

Keywords

Traffic Feature Conditional Entropy (tfce) Genetic Algorithm (ga) Cumulative Sum (cusum).