2018
DOI: 10.7763/ijet.2017.v9.1008
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Defense Algorithms of Different Types of DDoS Attacks

Abstract: Nowadays, computer network is very important because of the many advantages it has. However, it is also vulnerable to a lot of threats from attackers and the most common of such attack is the Distributed Denial of Service (DDoS) attack. This paper presents an overview of the existing detection and defense algorithms to mitigate four types of DDoS attacks and they are the UDP flood, TCP SYN flood, Ping of Death and Smurf attack. A detection and defense algorithm will be proposed in this paper and it will be eva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…A typical setup for an HTTP flood is presented in Figure 2. Slowloris sends incomplete requests at predefined intervals, aiming at keeping the request channels engaged for an extended period of time, preventing legitimate access to the target devices [37][38][39][40][41].…”
Section: Ddos Attack Typesmentioning
confidence: 99%
See 3 more Smart Citations
“…A typical setup for an HTTP flood is presented in Figure 2. Slowloris sends incomplete requests at predefined intervals, aiming at keeping the request channels engaged for an extended period of time, preventing legitimate access to the target devices [37][38][39][40][41].…”
Section: Ddos Attack Typesmentioning
confidence: 99%
“…TCP SYN floods send SYN messages to the victim but provide no confirmation to the victim for establishment of a connection with spoofed source IP addresses. In this manner, the target resources are exhausted over time, since it responds to each hand shake but never receives any confirmation from the attacker [37,41].…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…Defeating against DDoS attacks has been extensively researched recently [4][5][6][7][8][9][10][11][12][13][14][15][16][21][22][23], but there exist some limitations of the current approaches that require further investigation, namely:…”
mentioning
confidence: 99%