Distributed Denial of Service attack Techniques and Defense Mechanisms

International Journal of Computer Trends and Technology (IJCTT)          
© 2017 by IJCTT Journal
Volume-54 Number-2
Year of Publication : 2017
Authors : G. Nazia Sulthana, V.K. Sharma
DOI :  10.14445/22312803/IJCTT-V54P119


G. Nazia Sulthana, V.K. Sharma "Distributed Denial of Service attack Techniques and Defense Mechanisms". International Journal of Computer Trends and Technology (IJCTT) V54(2):120-125, December 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

A distributed denial of service (DDOS) is an attack which makes a computer system or network incapable of providing normal services. DDoS attacks are one of the oldest threats on the IT security landscape. They can be used to bring down Internet-facing business services and cause general havoc for any organization and its IT security staff. But despite having their roots in the past, DDoS attacks are still prevalent and devastating today, making the case to implement a dedicated mitigation solution to combat them stronger than it’s ever been. The rigorous survey presented in this paper describes a platform for the study of methods of DDoS attacks and their defense mechanisms.

[1] Stephen M. Specht, Ruby B. Lee, “Distributed Denial of Service:Taxonomies of Attacks, Tools and Countermeasures,” Electrical Engineering, Princeton University Princeton, NJ 08544.
[2] J. Mirkovic, P. Reiher, “A Taxonomy of DDoS Attack and DDoS defense Mechanisms”, ACM SIGCOMM Computer Communications Review,Vol. 34, Issue 2, pp. 39-53, April 2004.
[3] “DDoS Protection: Keeping Your Business Safe” Cogeco Peer-1, http://www.cogecopeer1.com/wp-content/uploads/2016, Jan-2016.
[4] Manish Gupta, Gayathri Gopalakrishnan, and Raj Sharman, “Countermeasures against Distributed Denial of Service”, 11th annual symposium on information assurance (Asia’16) June 8-9 2016 Albany, NY.
[5] Sakshi Kakkar, Dinesh Kumar, “A Survey on Distributed Denial of Services (DDOS)”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5(3), 2014.
[6] Yang Xiang, Ke Li, and Wanlei Zhou, “Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics”, IEEE Transactions on Information Forensics and Security, Vol. 6, No. 2, June 2011.
[7] Ahmad Sanmorino, Setiadi Yazid, “DDoS Attack Detection Method and Mitigation Using Pattern of the Flow”, International Conference of Information and Communication Technology (ICICT) 2013.
[8] Paul J.criscuolo, “Distributed Denial of Service Trinoo,Tribe Flood Network, Tribe Flood Network 2000,And Stachelrdaht CIAC-2319”,Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev1., Lawrence Livermore National Laboratory,Feb 14,2000.
[9] TFreak. “smurf.c”, www.phreak.org. Oct 1997. www.phreak.org/archives/exploits/denial/smurf.c (6 May 2003).
[10] Federal Computer Incident Response Center (FedCIRC), “Defense Tactics for Distributed Denial of Service attacks”.Washington, DC, 2000.
[11] TFreak,“fraggle.c”www.phreak.org/archives/exploits/denial/fraggle.c (6 May 2003).
[12] Martin, Michael J., “Router Expert: Smurf/Fraggle Attack Defense Using SACLS”, Networking Tips and Newsletters, www.searchnetwork.techtarget.com. Oct 2002. http://searchnetworking.techtarget.com/tip/1,289483,sid7_gci85 6112, 00.html (6 May 2003).
[13] “Nmap Stealth Port Scanner Introduction”, Insecure.org. August 2002. http://www.insecure.org/nmap/. (8 Apr 2003).
[14] Colon E. Pelaez and John Bowles, “Computer Viruses”,System Theory, 1991, Twenty-Third Southeastern Symposium,pp. 513-517, Mar 1999.
[15] CrispinCowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole, “Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade”, DARPA Information Survivability Conference and Exposition, 2000. Vol. 2 pp. 119-129, 2000.
[16] Microsoft “How to Write Active X Controls for Microsoft Windows CE2.1”, Microsoft Corporation. Jun 1999. http://msdn.microsoft.com/library/default.asp?url=/library/enus/dnce21/html/activexce.asp. (5 Apr 2003).
[17] Dancho Danchev. “The Complete Windows Trojans Paper”, BCVG Network Security. Oct 22, 2002. http://www.ebcvg.com/articles.php?id=91. (9 Apr 2003).
[18] Ruby B Lee, David Karig, Patrick McGregor and Zhijie Shi, “Enlisting Hardware Architecture to Thwart Malicious Code Injection”, Proceedings of the International Conference on Security in Pervasive Computing (SPC-2003), LNCS 2802, pp.237-252, Springer Verlag, March 2003.
[19] Joao B. D. Cabrera, Lundy Lewis, Xinzhou Qin, Wenke Lee, Ravi K. Prasanth, B. Ravichandran, and Ramon K. Mehra, “Proactive Detection of Distributed Denial of Service AttacksUsing MIB Traffic Variables – A Feasibility Study”, Integrated Network Management Proceedings, pp. 609-622, 2001.
[20] David K. Yau, John C. S. Lui, and Feng Liang, “Defending Against Distributed Denial of Service Attacks with Max-minFair Server-centric Router Throttles”, Quality of Service, 2002Tenth IEEE International Workshop, pp. 35-44, 2002.
[21] Vern Paxon, “An Analysis of Using Reflectors for Distributed Denial of Service Attacks”, ACM SIGCOMM Computer Communication Review, Vol. 31, Iss. 3, Jul 2001.
[22] Thomas E. Daniels and Eugene H. Spafford, “NetworkTraffic Tracking Systems: Folly in the Large?”, Proceedings of the 2000 Workshop on New Security Paradigms, Feb. 2001.

DDoS-Distributed Denial of Service, vulnerable systems, Traffic Detection, Bandwidth Exhaustion, Resource Exhaustion.