A Contemporary Survey and Taxonomy of the Distributed Denial-of- Service Attack in Server

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-63 Number-1
Year of Publication : 2018
Authors : B.Hemalatha, Dr.N.Sumathi
  10.14445/22312803/IJCTT-V63P101

MLA

MLA Style: B.Hemalatha, Dr.N.Sumathi "A Contemporary Survey and Taxonomy of the Distributed Denial-of- Service Attack in Server" International Journal of Engineering Trends and Technology 63.1 (2018): 1-7.

APA Style: B.Hemalatha, Dr.N.Sumathi (2018). A Contemporary Survey and Taxonomy of the Distributed Denial-of- Service Attack in Server. International Journal of Engineering Trends and Technology, 63(1), 1-7.

Abstract
Distributed Denial-of-service (DDoS) attack is one of the most perilous threats that could cause overwhelming effects on the web. The name entails, it’s an attack with the purpose of denying service to legitimate users, Distributed Denial of Service (DDoS) is defined as an attack in which several conciliation systems are made to attack and make the targeted systems services unavailable, this attack deliberately designed to render a system or network incapable of providing normal services. DDoS attack affects the computing environment, communication and server resources such as connectivity sockets, processing elements, memory, data bandwidth, network routing process etc for mutually connected system environment would surely vulnerable to the entire computing environment. It becomes essential for researchers and program developers to understand the behavior of DDoS attack because it has an effect on the target network without warning. Therefore must to develop an advanced intrusion detection and prevention systems for detecting and preventing to DDoS attack in the cyber space. This survey and taxonomy paper deals with the introduction of DDoS attacks, DDoS attack history and recent occurrence, DDoS attack tactics, different DDoS attack tools, and taxonomy of various attack and preventive mechanisms.

Reference
[1] Abdulkader A. Alfantookh “DoS Attacks Intelligent Detection using Neural Networks” J. King Saud University, Vol. 18, Computer & Information Science., pp. 27-45 A.H. 1426/2006
[2] Rufaikazeem Idowu, Ravie chandren M. Zulaiha ali othman “Denial of service attack detection using trapezoidal fuzzy reasoning spiking neural p system” Journal of Theoretical and Applied Information Technology, 31-5-2015. Vol.75. -No.3
[3] https://www.us-cert.gov/ncas/alerts/ TA13-088A
[4] MaryamM.Najafabadi, TaghiM. Khoshgoftaar, AmriNapolitano, Charles Wheelus “RUDY Attack : Detection at the Network Level and Its Important Features” Proceedings of the 29th International Florida Artificial Intelligence Research Society Conference
[5] X.Geng, A.B.Whinston, “Defeating Distributed Denial of Service attacks”, IEEE IT Professional 2-4-2000 page no. 36–42.
[6] FelixLau, RubinH.Stuart, SmithH. Michael, and et al., "Distributed Denial of Service Attacks," in Proceedings of 2000 IEEE International Conference on Systems, Man and Cybernetics, Nashville, TN, Vol.No.3, pp.2275-2280, 2000.
[7] Alagarsamy, Vadivel MuruganP. “Averting Buffer Overflow Attack in Networking OS using - BOAT Controller” International Journal of Computer Trends & Technology, July 7, 2013, volume 4
[8] P.Ferguson, and D. Senie, “Network ingress filtering: Defeating denial of ser-vice attacks which employ IP source address spoofing” RFC 2267, the Internet Engineering Task Force (IETF), 1998),
[9] R.Oppliger, “Internet Security: firewall and beyond,” Communications of the ACM, Volume 40, Issue 5, pp. 92-102, 1997.
[10] P.Vadivel Murugan and Dr.K.Alagarsamy “ Buffer Overflow Attack Vulnerability in Stack”. International Journal of Computer Applications 13(5)
[11] S.A.Arunmozhi, Y.Venkataramani, “DDoS attack and Defense in wireless ad-hoc Network,” International Journal of Network Security & Its Applications Vol.3, No.3, pp.182-187, May 2011
[12] York, K. Dyn statement on 10/21/2016 DDoS ttack, 2017, http://dyn.com/blog/dyn-statement-on-10212016-ddos- attack/ (accessed 10 March 2017)
[13] www.securelist.com/ddos-report-in-q1-2018/85373
[14] M.Duraipandian and C. Palanisamy. “An intelligent agent based defense architecture for ddos attacks”. In Electronics and Communication Systems (ICECS), 2014 International Conference on, pages 1–7, Feb 2014.
[15] Vadivelmurugan, p., & Alagarsamy, K. “Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm. International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 7–July 2013
[16] https://www.eecs.umich.edu/techreports/cse/2003/CSE-TR-473-03.
[17] Jelena Mirkovic, Peter Reiher “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms” ACM SIGCOMM Computer Communications Review , Volume 34, Number 2: April 2004
[18] McAfee, “Personal Firewall”. Available at: http://www.mcafee.com/ myapps/ firewall/ov_firewall.asp.
[19] Cybernetics, Nashville, TN, Vol.3, pp.2275-2280, 2000.
[20] Saman Taghavi Zargar, James Joshi, and David Tippe, “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks” IEEE Communications Surveys & Tutorials
[21] Sunny Behal, Krishan Kumar “Characterization and Comparison of DDoS Attack Tools and Track Generators - A Review” International Journal of Network Security, Vol.19, No.3, PP.383-393, May 2017
[22] Lovepreet Kaur Somal, IIKaranpreet Singh Virk “Classification of Distributed Denial of Service Attacks - Architecture, Taxonomy and Tools” International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014)
[23] Jelena Mirkovic, Janice Martin and Peter Reiher “A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms” Computer Science Department, University of California, Los Angeles Technical report #020018

Keywords
DDoS attack, Types of DDoS, preventive measures of DDoS, defense technique, security