Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Current Trends in Detection and Mitigation of Denial of Service Attacks - A Survey

Print
PDF
IJCA Proceedings on International Conference on Information and Communication Technologies
© 2014 by IJCA Journal
ICICT - Number 5
Year of Publication: 2014
Authors:
Shishira S R
Vasudeva Pai
Manamohan K

Shishira S R, Vasudeva Pai and Manamohan K. Article: Current Trends in Detection and Mitigation of Denial of Service Attacks - A Survey. IJCA Proceedings on International Conference on Information and Communication Technologies ICICT(5):13-16, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Shishira S R and Vasudeva Pai and Manamohan K},
	title = {Article: Current Trends in Detection and Mitigation of Denial of Service Attacks - A Survey},
	journal = {IJCA Proceedings on International Conference on Information and Communication Technologies},
	year = {2014},
	volume = {ICICT},
	number = {5},
	pages = {13-16},
	month = {October},
	note = {Full text available}
}

Abstract

Denial of Service (DoS) attack is a threat in today's network because DoS attacks are easy to launch, while defending a network resource against them is very difficult. DoS attack is an attempt to make a machine or network resource unavailable to its legitimate users. It has put tremendous pressure over security experts in bringing out effective defense solutions. These attacks could be implemented with variety of tools and codes. Large number of countermeasure techniques tries to detect the attack and filter it out. In this paper a study is made on recent techniques on Denial of Service protection. Our discussion aims to identify the current methods in detection and mitigation of DoS attacks in the network.

References

  • Saman Taghavi Zargar, Member, IEEE, James Joshi, Member, IEEE, and David Tipper, Senior Member, IEEE,"A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks"
  • SANS Institute. Subramani rao Sridhar rao ,"Denial of Service attacks and mitigation techniques: Real time implementation with detailed analyis" The SANS Institute,2011.
  • Forrester Consulting, The trends and changing landscape of DDoS threats and protection, a commissioned study conducted by Forrester Consulting on behalf of VeriSign, Inc. , July 2009.
  • Erikson, Jon (2008). HACKING the art of exploitation (2nd edition Ed. ). San Francisco:No Starch Press. p. 251. ISBN 1-59327-144-1.
  • Yun Liu et al. ,'Detecting DDoS Attacks Using Conditional Entropy', IEEE 2010.
  • Je Hak Lee ,Dong Seong Kim ,Sang Min Lee ,Jong Sou Park, 'DDoS Attacks Detection Using GA based Optimized Traffic Matrix',2011 IEEE Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
  • CaLynna Sorrells and Lijun Qian Husheng Li,"Quickest detection of denial-of-service attacks in cognitive wireless networks" ACM, 2012.
  • Divya Bansal, Sanjeev Sofat, "Use of cross layer interactions for detecting denial of service attacks in WMN",2010.
  • B. S. Kiruthika Devi, G. Preetha, S. Mercy Shalinie,"DDoS detection using host-network based metrics and mitigation in experimental testbed", IEEE, 2012.
  • Cornel Barna, Mark Shtern, Michael Smit, Vassilios Tzerpos, Marin Litoiu York University,"Model-based adaptive DoS attack mitigation", ACM, 2012.
  • Jing Yang Koh, Joseph Teo Chee Ming, and Dusit Niyato ,"Rate limiting client puzzle schemes for Denial-of-Service mitigation", IEEE 2013.
  • Hakem Beitollahi, Geert Deconinck, Katholieke Universiteit Leuven, Belgium "FOSeL: Filtering by helping an overlay security layer to mitigate DoS attacks", IEEE, 2008.
  • David L,Meenakshi Sood,Mahesh Kumar Kajla,"Router based approach to mitigate DoS attacks on the wireless networks,IEEE,2011.