scispace - formally typeset
Search or ask a question

DDoS Attacks- explains the cause of these and what counter measure should be done to address these vulnerabilities? 


Best insight from top research papers

DDoS attacks are becoming increasingly challenging to counter due to the availability of vast resources and techniques for attackers . These attacks can be protocol-compliant, non-intrusive, and utilize legitimate application-layer requests to overwhelm system resources . To address these vulnerabilities, counter-measures such as DDoS Shield can be implemented. DDoS Shield consists of a suspicion assignment mechanism and a DDoS-resilient scheduler . The suspicion mechanism assigns a continuous value to each client session, and the scheduler uses these values to determine when to schedule a session's requests . This counter-mechanism has been shown to improve the performance of victims under resource attacks, such as asymmetric attacks, which can significantly increase response times for legitimate clients .

Answers from top 3 papers

More filters
Papers (3)Insight
Book ChapterDOI
01 Jan 2016
4 Citations
The text does not provide information about the causes of DDoS attacks or countermeasures to address vulnerabilities.
The paper discusses protocol-compliant, non-intrusive layer-7 DDoS attacks and proposes a counter-mechanism called DDoS Shield to protect servers from these attacks.
Proceedings ArticleDOI
Xinfeng Ye, S. Singh 
09 Jul 2007
13 Citations
The paper proposes a SOA approach using Web services to build a system against DDoS attacks targeting online businesses.

Related Questions

How to mitigate DDoS signalling attack?5 answersTo mitigate DDoS signalling attacks effectively, various strategies have been proposed in recent research. One approach involves leveraging the virtualized environment of 5G to implement intelligent resource scaling strategies like REPEL, which uses game theory to build a defense front line against attacks while preserving legitimate traffic. Another method includes a resource sharing technique combined with IP address tracking and memory management systems to filter out unwanted IP packet requests, showcasing the potential to mitigate a significant portion of attacks with a limited number of VMs. Additionally, a defense mechanism based on randomization techniques has been shown to significantly reduce signaling data volume in 5G systems, particularly under malicious conditions, by up to 70% while avoiding unnecessary resource consumption. These innovative approaches demonstrate promising avenues for combating DDoS signalling attacks in modern network environments.
What are the primary causes of DDoS attacks in recent years?5 answersIn recent years, the primary causes of Distributed Denial of Service (DDoS) attacks include the exploitation of vulnerable servers to generate massive traffic effortlessly, the emergence of application-level DDoS attacks targeting specific service logic to disrupt availability, and the utilization of IoT devices' limited resources by attackers, leading to network congestion and outages. Factors such as the interdependency of Internet security, resource imbalances between attackers and defenders, and the untraceable nature of malicious packets also contribute to the rise of DDoS attacks. These attacks have been further fueled by the commoditization of DDoS services, allowing easy access to attack capabilities for a low cost, exacerbating the frequency and impact of DDoS incidents.
How effective are current security measures in mitigating vulnerabilities in the Tor network?5 answersCurrent security measures in mitigating vulnerabilities in the Tor network are not specifically addressed in the provided abstracts.
What are the most common cyber security vulnerabilities?4 answersThe most common cyber security vulnerabilities include ClickJacking, Host Header Injection, Port Scanning, Reverse IP, phishing, denial-of-service, malware, cloud attacks, attacks from IoT, hardware and software attacks, phishing attacks, ransomware attacks, cryptocurrency and blockchain attacks.
How vulnerabilities in malware happens?3 answersVulnerabilities in malware occur when weaknesses in computer systems are exploited. Malware can infect systems by taking advantage of conditions in software, allowing it to cause damage or perform illegitimate actions. In the case of the Android operating system, malware attacks often exploit system loopholes or vulnerabilities. These vulnerabilities can be mapped to malware using techniques such as natural language processing and machine learning classifiers. Deep-learning algorithms used for malware detection are also susceptible to adversarial examples, which are carefully-crafted perturbations that mislead classification. These algorithms tend to learn to discriminate between benign and malware samples based on characteristics found in the file header, rather than meaningful characteristics for malware detection. This understanding of vulnerabilities in malware can help in developing effective detection and mitigation strategies.
What is ddos attack?3 answersA Distributed Denial of Service (DDoS) attack is a deliberate and coordinated attack by multiple compromised machines to overwhelm an online service or server. Attackers send voluminous dummy data to exhaust the target machine's resources, causing the service to become unavailable. DDoS attacks pose a significant threat to internet security and have become increasingly sophisticated. Various techniques and algorithms, such as deep learning models, dynamic threshold detection, and random forest algorithms, have been proposed for detecting and mitigating DDoS attacks. These methods aim to achieve high accuracy, low false alarm rates, and faster processing times. Cloud service providers also offer DDoS mitigation and prevention services to protect their users from such attacks.