DDOS and Compilation of Mitigation Techniques
Ayush Goyal,Palak Baid +1 more
Reads0
Chats0
TLDR
This paper has done a comprehensive research on types of DDOS attacks and mitigating its effects, finding that this attack cannot be fully curbed, but it can be extenuated to a certain extent.Abstract:
In network communication, attackers often breach the security. Therefore, keeping the data and servers secure is a very crucial task. Among several online attacks, DDOS is the most devastating attack. This attack has the most ravaging effect on the servers. There exists a tremendous pressure on security experts to mitigate the annihilating effects of this attack. In this paper, we have done a comprehensive research on types of DDOS attacks and mitigating its effects. Albeit this attack cannot be fully curbed, it can be extenuated to a certain extent.read more
References
More filters
Proceedings Article
Pointguard TM : protecting pointers from buffer overflow vulnerabilities
TL;DR: The PointGuard implementation is described, its overhead is shown to be low when protecting real security-sensitive applications such as OpenSSL, and it is shown that PointGuard is effective in defending against buffer overflow vulnerabilities that are not blocked by previous defenses.
Proceedings Article
Denial of service via algorithmic complexity attacks
Scott A. Crosby,Dan S. Wallach +1 more
TL;DR: A new class of low-bandwidth denial of service attacks that exploit algorithmic deficiencies in many common applications' data structures, and it is shown how modern universal hashing techniques can yield performance comparable to commonplace hash functions while being provably secure against these attacks.
Proceedings ArticleDOI
SAVE: source address validity enforcement protocol
TL;DR: A new protocol is described, named SAVE, that can provide routers with the information needed for source address validation, and its correctness and performance are evaluated by simulation experiments.
Proceedings Article
Using client puzzles to protect TLS
Drew Dean,Adam Stubblefield +1 more
TL;DR: Measurements of CPU load and latency when the modified library is used to protect a secure webserver show that client puzzles are a viable method for protecting SSL servers from SSL based denial-of-service attacks.
Journal ArticleDOI
Evaluation of TFTP DDoS amplification attack
TL;DR: This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Protocol (TFTP), which could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks.