scispace - formally typeset
Open AccessJournal ArticleDOI

DDOS and Compilation of Mitigation Techniques

Ayush Goyal, +1 more
- 17 Apr 2018 - 
- Vol. 180, Iss: 34, pp 34-39
Reads0
Chats0
TLDR
This paper has done a comprehensive research on types of DDOS attacks and mitigating its effects, finding that this attack cannot be fully curbed, but it can be extenuated to a certain extent.
Abstract
In network communication, attackers often breach the security. Therefore, keeping the data and servers secure is a very crucial task. Among several online attacks, DDOS is the most devastating attack. This attack has the most ravaging effect on the servers. There exists a tremendous pressure on security experts to mitigate the annihilating effects of this attack. In this paper, we have done a comprehensive research on types of DDOS attacks and mitigating its effects. Albeit this attack cannot be fully curbed, it can be extenuated to a certain extent.

read more

Content maybe subject to copyright    Report

References
More filters
Proceedings Article

Pointguard TM : protecting pointers from buffer overflow vulnerabilities

TL;DR: The PointGuard implementation is described, its overhead is shown to be low when protecting real security-sensitive applications such as OpenSSL, and it is shown that PointGuard is effective in defending against buffer overflow vulnerabilities that are not blocked by previous defenses.
Proceedings Article

Denial of service via algorithmic complexity attacks

TL;DR: A new class of low-bandwidth denial of service attacks that exploit algorithmic deficiencies in many common applications' data structures, and it is shown how modern universal hashing techniques can yield performance comparable to commonplace hash functions while being provably secure against these attacks.
Proceedings ArticleDOI

SAVE: source address validity enforcement protocol

TL;DR: A new protocol is described, named SAVE, that can provide routers with the information needed for source address validation, and its correctness and performance are evaluated by simulation experiments.
Proceedings Article

Using client puzzles to protect TLS

TL;DR: Measurements of CPU load and latency when the modified library is used to protect a secure webserver show that client puzzles are a viable method for protecting SSL servers from SSL based denial-of-service attacks.
Journal ArticleDOI

Evaluation of TFTP DDoS amplification attack

TL;DR: This work outlines an evaluation tool and evaluates an amplification attack based on the Trivial File Transfer Protocol (TFTP), which could have amplification factor of approximately 60, which rates highly alongside other researched amplification attacks.