A Comprehensive Survey of Distributed Defense Techniques against DDoS Attacks

نویسندگان

  • Monika Sachdeva
  • Gurvinder Singh
  • Krishan Kumar
  • Kuldip Singh
چکیده

Distributed Denial of Service Attacks imposes a major threat to the availability of Internet services. Most of the applications like banking, trade, and e-commerce are dependent on availability of Internet. Defending Internet from these attacks has become the need of the hour. A typical DDoS defense comprises of three modules namely traffic monitoring, traffic analysis and traffic filtering. Based on placement of these modules, DDoS defense can be categorized into centralized DDoS defense and distributed DDoS defense. In centralized defense, all modules are placed on single point. Under severe DDoS attack, centralized defense itself succumbs to high volume of traffic. Hence it is itself vulnerable to DDoS attacks. In distributed defense, all of the defense modules are placed at different points and do not succumb to high volume of DDoS attack and can discover the attacks timely as well as fight the attacks with more resources. In this paper first important metrics are identified to evaluate distributed defense techniques. Then a comparative analysis based on identified metrics is done for existing distributed defense techniques. Research gaps are also highlighted in exiting techniques so as pursue research in this problem. Finally a generic defense methodology is proposed to combat DDoS attacks in automated manner.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Defense Framework for Flooding-based DDoS Attacks

Distributed denial of service (DDoS) attacks are widely regarded as a major threat to the Internet. A flooding-based DDoS attack is a very common way to attack a victim machine by sending a large amount of malicious traffic. Existing networklevel congestion control mechanisms are inadequate in preventing service quality from deteriorating because of these attacks. Although a number of technique...

متن کامل

An Inline Detection and Prevention Framework for Distributed Denial of Service Attacks

By penetrating into a large number of machines and stealthily installing malicious pieces of code, a distributed denial of service (DDoS) attack constructs a hierarchical network and uses it to launch coordinated assaults. DDoS attacks often exhaust the network bandwidth, processing capacity and information resources of victims, thus, leading to unavailability of computing systems services. Var...

متن کامل

Deployment of Distributed Defense against DDoS Attacks in ISP Domain

Distributed Denial of Service attacks pose a serious threat to the online applications like banking, trade, and e-commerce which are dependent on availability of Internet. Defending Internet from these attacks has become the need of the hour for sustainable development of any economy. Most of the research work in this area focuses on developing defense against these attacks without considering ...

متن کامل

DoS and DDoS Attacks: Defense, Detection and TracebackMechanisms -A Survey

Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks are typically explicit attempts to exhaust victim’s bandwidth or disrupt legitimate users’ access to services. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to gain access to a large number of compromised computers by exploiting their vulnerabilities to set ...

متن کامل

A Comprehensive Taxonomy of DDoS Attacks and Defense Mechanism Applying in a Smart Classification

-A Distributed denial of service (DDoS) attack uses multiple machines operating in concern to attack a network or site. It is the most important security problem for IT managers. These attacks are very simple organized for intruders and hence so disruptive. The detection and defense of this attack has specific importance among network specialists. In this paper a new and smart taxonomy of DDoS ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010