2017
DOI: 10.1177/1550147717741463
|View full text |Cite
|
Sign up to set email alerts
|

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

Abstract: Distributed denial-of-service is one kind of the most highlighted and most important attacks of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article, we present a comprehensive survey of distributed denial-of-service attack, prevention, and mitigation techniques. We provide a systematic analysis of this type of attacks including motivations and evolution, analysis of different attacks so far, protection techniqu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
133
0
8

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 247 publications
(141 citation statements)
references
References 127 publications
0
133
0
8
Order By: Relevance
“…According to Cisco cybersecurity report, 30% organizations have experienced cyber attacks in 2019. Denial of Service (DoS) and Distributed DoS (DDoS) [1] are the most common attacks on the Internet recently. In DoS and DDoS, attackers take control of many hosts, known as botnets and use them to send extremely large numbers of request to victims to stop their services.…”
Section: Introductionmentioning
confidence: 99%
“…According to Cisco cybersecurity report, 30% organizations have experienced cyber attacks in 2019. Denial of Service (DoS) and Distributed DoS (DDoS) [1] are the most common attacks on the Internet recently. In DoS and DDoS, attackers take control of many hosts, known as botnets and use them to send extremely large numbers of request to victims to stop their services.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, a DDoS attack adds a many‐to‐one dimension to the DoS problem. Instead of using one connection, a DDoS attack often uses thousands of compromised hosts to execute an attack, amplifying both the available attacker resources and the complexity of the attack …”
Section: Introductionmentioning
confidence: 99%
“…Among the significant types of events that lead to traffic anomalies, some of the most important include denial of service (DoS), flash crowds, port scans, and worms. DoS is usually a type of attack in which one or more hosts try to turn a particular host or service unavailable so that the attacked entity cannot process legitimate requests. Flash crowds cause a sudden increase on the number of accesses to a given service.…”
Section: Introductionmentioning
confidence: 99%