scispace - formally typeset
Journal ArticleDOI

A taxonomy of DDoS attack and DDoS defense mechanisms

Reads0
Chats0
TLDR
This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Abstract
Distributed denial-of-service (DDoS) is a rapidly growing problem. The multitude and variety of both the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem and the current solution space. The attack classification criteria was selected to highlight commonalities and important features of attack strategies, that define challenges and dictate the design of countermeasures. The defense taxonomy classifies the body of existing DDoS defenses based on their design decisions; it then shows how these decisions dictate the advantages and deficiencies of proposed solutions.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings Article

Understanding the mirai botnet

TL;DR: It is argued that Mirai may represent a sea change in the evolutionary development of botnets--the simplicity through which devices were infected and its precipitous growth, and that novice malicious techniques can compromise enough low-end devices to threaten even some of the best-defended targets.
Journal ArticleDOI

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

TL;DR: The primary intention for this work is to stimulate the research community into developing creative, effective, efficient, and comprehensive prevention, detection, and response mechanisms that address the DDoS flooding problem before, during and after an actual attack.
Journal ArticleDOI

Survey Cyber security in the Smart Grid: Survey and challenges

TL;DR: This paper focuses on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid, and aims to provide a deep understanding of security vulnerabilities and solutions in the smart grid.
Journal ArticleDOI

Survey of network-based defense mechanisms countering the DoS and DDoS problems

TL;DR: This survey analyzes the design decisions in the Internet that have created the potential for denial of service attacks and the methods that have been proposed for defense against these attacks, and discusses potential countermeasures against each defense mechanism.
Journal ArticleDOI

Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines

TL;DR: An architectural framework for resilience and survivability in communication networks is provided and a survey of the disciplines that resilience encompasses is provided, along with significant past failures of the network infrastructure.
References
More filters
Journal ArticleDOI

The Tragedy of the Commons

TL;DR: The population problem has no technical solution; it requires a fundamental extension in morality.
Journal ArticleDOI

The Tragedy of the Commons

TL;DR: The tragedy of the commons as a food basket is averted by private property, or something formally like it as mentioned in this paper, which is why the commons, if justifiable at all, is justifiable only under conditions of low-population density.
Proceedings ArticleDOI

Resilient overlay networks

TL;DR: It is found that forwarding packets via at most one intermediate RON node is sufficient to overcome faults and improve performance in most cases, demonstrating the benefits of moving some of the control over routing into the hands of end-systems.
Journal ArticleDOI

Resilient overlay networks

TL;DR: It is found that forwarding packets via at most one intermediate RON node is sufficient to overcome faults and improve performance in most cases, demonstrating the benefits of moving some of the control over routing into the hands of end-systems.

Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing

P. Ferguson, +1 more
TL;DR: A simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point is discussed.
Related Papers (5)