Open Access Open Access  Restricted Access Subscription Access

A General Understanding using Facts, Case Studies, and a Survey on Distributed Denial-of-Service Attacks

Aditi Neema, Aditi Thakur

Abstract


Distributed denial-of-service (DDoS) attack is a type of malware. The history of DDoS attacks is disputatious. There are three forms of DDoS attacks—volume-based, application-based, and protocol-based, and nine types of attacks have been discussed. With possible potential motivations and procedures for carrying out DDoS attacks, some facts have been discussed to show the intensity of danger from DDoS attacks. Case studies prove that even having high security on your system like antivirus software is also not enough to save you from a DDoS attack. Knowing the importance of this knowledge, a survey of 100 students was taken, whose figures were not impressive enough. The survey plays an important role in accentuating the statement—“it is indispensable to increase awareness about DDoS attacks and enforce specific laws against DDoS attacks and simultaneously reduce the price of antivirus software.”

Keywords


Antivirus software, distributed-denial-of-service attack, malware

Full Text:

PDF

References


Sujatha Sivabalan, PJ Radcliffe. A novel framework to detect and block DDoS attack at the application layer. IEEE 2013 Tencon–Spring. Sydney, NSW, Australia. 2013, April 17–19. https://ieeexplore.ieee.org/abstract/document/6584511.

Jaafar G, Abdullah S, Ismail S. Review of recent detection methods for HTTP DDoS attack. Journal of Computer Networks and Communications. 2019.

Jianxin Yan, Stephen Early, Ross Anderson. The XenoService: A distributed defeat for distributed denial of service. Proceedings of ISW 2000. 2000. Oct. https://www.cl.cam.ac.uk/~rja14/Papers/xeno.pdf.

Ashley Chonka, Jaipal Singh, et al. Chaos theory based detection against network mimicking DDoS attacks. IEEE Communications Letters. 2009; 13(9): 717–719.

Christos Douligeris, Aikaterini Mitrokotsa. DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks. 2004; 44(5): 643–666.

Jussipekka Leiwo, Yuliang Zheng. A method to implement a denial of service protection base. Information Security and Privacy. 1997; 1270: 90–101. 7. A Quick Look Back: DDoS Handbook. Radware the ultimate guide to everything you need to know about DDoS attacks. (2015). https://www.radware.com/getattachment/Security/ Research/702/Radware_DDoS_Handbook_2015.pdf.aspx?lang=en-US.

Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance. Chapman and Hall/CRC; 2016.

Brij B Gupta, Amrita Dahiya. Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures. CRC Press; 2021.

NR Shetty, LM Patnaik, et al. Emerging research in computing, information, communications and applications ERCICA 2016. Springer. https://www.springer.com/gp/book/9789811047404 11. Love John. (Apr, 2018). A brief history of malware-its evolution and impact. blog by lastline. Available from https://www.lastline.com/blog/history-of-malware-its-evolution-and-impact/.

Cipher. 10 interesting facts about DDoS attacks. 2020 June22. Available from https://cipher.com/blog/10-interesting-facts-about-ddos-attacks/.

Sam Cook. (May, 2021). DDoS attack statistics and facts for 2018–2021. Available from https://www.comparitech.com/blog/information-security/ddos-statistics-facts/.

David Warburton. (May, 2021). DDoS attack trends for 2020. Available from https://www.f5.com/labs/articles/threat-intelligence/ddos-attack-trends-for-2020.

Paul Nicholson. (Feb, 2021). Five most famous DDoS attacks and then some. Available from https://www.a10networks.com/blog/5-most-famous-ddos-attacks/.

Ethan Zuckerman, HAL Roberts, Jillian C York (Jan, 2021). Distributed denial of service attacks against independent media and human rights sites. Berkman Klein Center. Available from https://cyber.harvard.edu/events/luncheon/2011/01/zuckerman_roberts.




DOI: https://doi.org/10.37591/jons.v9i2.823

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517