2012
DOI: 10.5120/7640-0724
|View full text |Cite
|
Sign up to set email alerts
|

Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art

Abstract: Botnets are prevailing mechanisms for the facilitation of the distributed denial of service (DDoS) attacks on computer networks or applications. Currently, Botnet-based DDoS attacks on the application layer are latest and most problematic trends in network security threats. Botnet-based DDoS attacks on the application layer limits resources, curtails revenue, and yields customer dissatisfaction, among others. DDoS attacks are among the most difficult problems to resolve online, especially, when the target is t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
67
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 121 publications
(68 citation statements)
references
References 22 publications
(26 reference statements)
1
67
0
Order By: Relevance
“…Moreover, the majority of the agents are fully configured and controlled through complex PHP scripts and encrypted communications, while a number of agents is used only to report statistics to a controlling Web site [9].…”
Section: ) Web-based Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, the majority of the agents are fully configured and controlled through complex PHP scripts and encrypted communications, while a number of agents is used only to report statistics to a controlling Web site [9].…”
Section: ) Web-based Modelmentioning
confidence: 99%
“…DDoS attacks can be distinguished according to the TCP/IP layer of the protocol used during the attack [9], [17]: Network Level and Application Level. In Network Level DDoS attacks, either Network or Transport layer protocols are used to carry out the attack, while in Application Level DDoS attacks the victim resources (e.g., CPU, memory, disk/database, etc.)…”
Section: Protocol Levelmentioning
confidence: 99%
See 1 more Smart Citation
“…From the hacking point of view, botnets are considered as one of the most dangerous types of attacks, which can be utilized and controlled for any type of malicious purposes (e.g. most commonly for DDoS (Distributed Denial of Service) or spam attacks) [64]- [66], [73]. For example, recently, the Check Point researchers have discovered a new strain of malware on the Google Play Store.…”
Section: C) Man-in-the-middle (Mitm) Is a Kind Of Stealthymentioning
confidence: 99%
“…So, when a huge a number of fake request or queries come to the server, the server gets busy and the actual user request cannot be entertained in that period. Hence the denial of service occurred [25].Usually, the cloud network is a distributed system, therefore, distributed denial of service happens more often [20].…”
Section: Introductionmentioning
confidence: 99%