Open Access Open Access  Restricted Access Subscription Access

Cyber Security and Distributed Denial of Services (DDoS) Attack Prevention


Affiliations
1 Department of Computer Engineering, Modern College of Engineering, Pune - 05, India
 

This paper discusses the role of cyber security in our day-to-day life and explains the DDoS (Distributed Denial of Service) Attack. The legal provisions available to tackle the DDoS attack are also elaborated.

Cyber security is a broad issue. The millions of devices linked to the Internet have variable levels of safety. There are many known and unknown vulnerabilities in the hardware and software on which these devices run. Technology too is changing at a very high rate. Attackers with poor intent need to be successful only once defenders of cyber security have to be successful all of the time.

With the increase in cyber attacks, there is a growing need to increase skills in the concepts and technology of cyber-security.


Keywords

DDoS attack, DoS attack.
User
Notifications
Font Size

  • Dale C. Rowe, Barry M. Lunt, and Joseph J. Ekstrom, ``The Role of Cyber Security in Information Technology Education,`` Proceedings of the 2011 conference on Information technology education, vol. 20, no. 11, pp. 113-122, 2011.
  • B. B. Gupta, R. C. Joshi, and Manoj Misra, ``Distributed Denial of Service Prevention Techniques,``International Journal of Computer and Electrical Engineering, vol. 2, no. 2, pp. 1793-8163, April 2010.
  • B. B. Gupta, ``A Selective Survey of Distributed Denial-of-Service (DDOS) Attacks and Defense Mechanisms,`` International Journal on Information Sciences and Computing, vol.2, no.1, July 2008.
  • Saman Taghavi Zargar, James Joshi, and David Tripper, ``A Survey of Defense Mechanisms Against Distributed Denial of Service (DDOS) Flooding Attacks,`` IEEE Communications Surveys & Tutorials, accepted for publication.
  • Mohd Imran, Mr. Shashi Bhshan, and Ms. Anuja Sharma, ``A Protective Model of Distributed Denialof-Service in Internet For Lack of Variations,`` International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, Issue 7, July 2014.
  • Singel R., ``Cyberwar Hype Intended to Destroy the Open Internet. Wired,`` March1,2010.http://www.wired.com/threatlevel/2010/03/cyber-war-hype.
  • Souza, P. d., Rowe, D. C., Ali, A., et al., ``Cyber Dawn: Libya. Cyber Security Forum Initiative (CSFI),`` May 2011.
  • Saman Taghavi Zargar, James Joshi, and David Tipper, ``A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks,`` June 2013.
  • Douligeris, A. Mitrokotsa, ``DDoS attacks and defense mechanisms: classification and state-of-the-art Computer Networks,`` Volume 44, Issue 5, pp.643-666, April 2004.
  • C. Douligeris, A. Mitrokotsa, ``DDoS attacks and defense mechanisms: classification, in Proceedings of the 3rd IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 03), Darmstadt, Germany,`` pp. 190-193, Dec. 14- 17, 2003.
  • D. Moore, C. Shannon, D. J. Brown, G. Voelker, S. Savage. ``Inferring Internet Denial-of-Service Activity,`` ACM Transactions on Computer Systems, 24 (2), pp 115-139, 2006.
  • Juniper Network, ``Combating Bots and Mitigating DDoS Attacks (Solution brief),`` Juniper Networks, Inc, 2006.
  • J. Mirkovic, P. Reiher, ``ATaxonomy of DDoSAttack and DDoS defense Mechanisms,`` ACM SIGCOMM Computer Communications Review, Vol. 34, Issue 2, pp. 39-53, April 2004.
  • D. Dittrich, ``The Tribe Flood Network Distributed Denial of Service attack tool,`` University of Washington, October 21, 1999. Available at: http:// staff.washington.edu/dittrich/misc/tfn.analysis.txt.
  • J. Barlow, W. Thrower, ``TFN2KAn Analysis,`` Axent Security Team. February 10, 2000. Available at: http://security.royans.net/info/posts/bugtraq_ ddos2.shtml.
  • D. Dittrich, ``The Stacheldraht Distributed Denial of Service attack tool,`` University of Washington, December 1999. Available at: http://staff.washington.
  • S. Dietrich, N. Long, D. Dittrich, ``Analyzing Distributed Denial of Service tools: The Shaft Case, in Proceedings of the 14th Systems Administration Conference (LISA 2000), New Orleans, LA, USA,`` pp. 329-339, December 3–8, 2000.
  • D. Dittrich, G. Weaver, S. Dietrich, and N. Long, ``The "Mstream” distributed denial of service attack too,`` Available at: http://staff.washington.edu/ dittrich/misc/mst ream.analysis.txt.,May 2000.
  • Bysin,``Knight.c sourcecode,``PacketStormSecurity.nl,. Available at: http://packetstormsecurity.nl/distributed/ knight. C, July 11, 2001.
  • B. Hancock, ``Trinity v3, a DDoS tool,`` hits the streets, Computers Security 19(7), pp. 574, 2000.
  • M. Marchesseau, ``Trinity- Distributed Denial of Service Attack Tool`` Available at: http://www.giac.org/certified_professionals/practicals/gsec/0123.php, 11 Sept 2000.
  • X. Geng, A.B. Whinston, ``Defeating Distributed Denial of Service attacks,`` IEEE IT Professional 2 (4) (2000) 36–42.
  • Felix Lau, Rubin H. Stuart, Smith H. Michael, and et al., ``Distributed Denial of Service Attacks,`` in Proceedings of 2000 IEEE International Conference on Systems, Man, and Cybernetics, Nashville, TN, Vol.3, pp.2275-2280, 2000.
  • P. Ferguson, and D. Senie, ``Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing,`` RFC 2267, the Internet Engineering Task Force (IETF), 1998.
  • Baker, F. ``Requirements for IP version 4 routers,``RFC 1812, Internet Engineering Task Force (IETF).Go online to www.ietf.org.
  • K. Park, and H. Lee, ``On the effectiveness of routerbased packet filtering for distributed DoS attack prevention in power-law Internets,” Proceedings of the ACM SIGCOMM Conference, pp.15-26, 2001.
  • T. Peng, C. Leckie, K. Ramamohanarao, ``Protection from Distributed Denial of Service attack using history-based IP filtering,`` in Proceedings of IEEE International Conference on Communications (ICC 2003), Anchorage, AL, USA, Vol. 1, pp. 482-486, 2003.
  • T. Anderson, T. Roscoe, D. Wetherall, ``Preventing Internet Denial-of- Service with Capabilities,`` In ACM SIGCOMM Computer Communication Review, Vol. 34, Issue 1, pp. 39-44, January 2004.
  • A. D. Keromytis, V. Misra, and D. Rubenstein, ``SOS: Secure Overlay Services,`` in the Proceedings of. ACM SIGCOMM, pp. 61-72, 2002.
  • B. B. Gupta, Student , R. C. Joshi, and Manoj Misra, ``Distributed Denial of Service Prevention Techniques,`` International Journal of Computer and Electrical Engineering, Vol. 2, No. 2, 1793-8163, April, 2010.

Abstract Views: 152

PDF Views: 89




  • Cyber Security and Distributed Denial of Services (DDoS) Attack Prevention

Abstract Views: 152  |  PDF Views: 89

Authors

S. A. Itkar
Department of Computer Engineering, Modern College of Engineering, Pune - 05, India
Chanda Agarwal
Department of Computer Engineering, Modern College of Engineering, Pune - 05, India

Abstract


This paper discusses the role of cyber security in our day-to-day life and explains the DDoS (Distributed Denial of Service) Attack. The legal provisions available to tackle the DDoS attack are also elaborated.

Cyber security is a broad issue. The millions of devices linked to the Internet have variable levels of safety. There are many known and unknown vulnerabilities in the hardware and software on which these devices run. Technology too is changing at a very high rate. Attackers with poor intent need to be successful only once defenders of cyber security have to be successful all of the time.

With the increase in cyber attacks, there is a growing need to increase skills in the concepts and technology of cyber-security.


Keywords


DDoS attack, DoS attack.

References