Study and Evaluation of Recent DDOS Trends of Attack on Web Server
DOI:
https://doi.org/10.53555/cse.v2i6.181Keywords:
Distributed Denial of Service (DDoS), DDOS attacks,, DDOS Incidents,, Web Server.Abstract
Distributed Denial of Service (DDoS) attacks have become a major threat to the Internet community
because DDoS attacks are regularly launched by well organized and widely spread botnet computers that are concurrently and accordingly sending large amount of traffic or service request to the target system. The target system either responds so slowly or crashes completely. These attacks not only congest a Server, but also affect the performance of other Servers on the entire network also, which are connected to Backbone Link directly or indirectly. The focus of this study, based on existing literature, covers the architecture or models of DDoS attacks and DDoS attack tools, propose taxonomies to characterize the scope of DDoS attacks and categorize it based on their types, and also the recent trends of DDoS attacks on web server are studied and evaluated.
Downloads
References
AlomariE., ManickamS., GuptaB., KaruppayahS, and AlfarisR., (2012) "Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art," International Journal of Computer Applications (0975 –8887), vol. 49.
AroraK., KumarK., SachdevaM.,(2011). ”Impact Analysis of Recent DdoS Attacks”, International Journal of ComputerScience and Engineering., ISSN 0975-3397,Vol. 3,pp 877-884.
B. L. Communication,(2014)"Threat Report," http://www.blacklotus.net/wp-content/uploads/Black-Lotus-Threat-Report-Volume-I-Issue-3-21-April-2014, vol. 1.
Bysin, (2001). “knight.c sourcecode,". Available at:http://packetstormsecurity.org/distributed/knight.c
CERT,(2001)‘Denial of Service Attacks’available at http://www.cert.org/tech tips/denialofservice.html
CERT Coordination Center, (2001)Trends in Denial of Serviceattack technology, Available from http://www.cert.org/archive/pdf/DoS_trends.pdf.
Chang R. K. C.,(2002)Defending against flooding-based distributed denial ofservice attacks: A tutorial, Computer journal of IEEE CommunicationsMagazine, Vol. 40, no. 10, pp. 42-51.
Christos D. and Aikaterini M.(2004). “DDoS attacks and defense mechanisms: classificationand state-of-the-art”Available at http://www.sciencedirect.com. Computer Networks pg. 643–666.
Cichardson R., (2007). “Computer Crime and SecuritySurvey,” available at http://www.crime-research.org/news/11.06.2004/423.
CompanyV.,(2006)"Distributed Denial of Service (DDoS) andBotnet Attacks," An iDefense Security Report.
CriscuoloP. J.,(2000),Distributed Denial of Service, Tribe Flood Network 2000,and Stacheldraht CIAC-2319, Department of Energy Computer IncidentAdvisory Capability (CIAC), UCRL-ID-136939, Rev. 1., LawrenceLivermore National Laboratory.
Daljeet K., MonicaS., Krishan K.,(2012)"Recent DDoS Incidents and Their Impact," International Journal of Scientific &Engineering Research, vol. 3.
Daljeet K. and Monika S.(2014). “Impact Analysis of DDoS Attacks on FTP Services”,Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, Journal of Association of Computer Electronics and Electrical Engineers pg. 220-228.
Dhruv A. P., Prof Patel H.(2014). Detection and Mitigation of DDOS Attack against Web Server, International Journal of Engineering Development and Research, vol. 2.
FBI, "Justice Department Charges Leaders of Megaupload withWidespread Online Copyright Infringement," 2012. Available at: http://www.fbi.gov/news/pressrel/press-releases/justice-department-charges-leaders-of-megaupload-with-widespread-online-copyright-infringement.
Gonsalves C., (2007). Akamai.DDoS Attack WhacksWeb Traffic, available at http://www.eweek.com/article2/0,1895,1612739,00.Asp.
Gordon A., Loeb P., Lucysgyn W., andRichardson R.,(200)CSI/FBI Computer Crime andSecurity Survey, CSI Publications.
Gupta B. B., Joshi R. C., Misra M.,(2010).Distributed Denialof Service Prevention Techniques, International Journalof Computer and Electrical Engineering (IJCEE), vol. 2,number 2, pp. 268-276.
Headlines,(2012)"DDoS Attacks Against Government and Entertainment Websites Escalate,". Available at: http://www.infosecisland.com/blogview/19543-DDoS-Attacks-Against-Government-and-Entertainment-Websites-Escalate.html.
HancockB., (2001) "Trinity v3, a DDoStool, hits the streets,"Computers & Security, vol. 19, pp. 574-574.
ITworld.com. (2001) "CERT hit by DDoS attack for a third day,". Available at: http://www.itworld.com/IDG010524CERT2
KernerS.M.,(2011)."DDoS Attacks on the Rise," 2011.Available at:http://www.esecurityplanet.com/trends/article.php/3932976/DDoS-Attacks-on-the-Rise.htm
KittenT., DDoS: Lessons from Phase 2 Attacks, available at http://www.bankinfosecurity.com/ddos-attacks-lessons-from-phase-2-a-5420/op-1
Lai S. and Wang M.(2014) “Principal Analysis and Defense Technologies of Application Layer DDos Attacks”. Journal of International Conference on Mechatronics, Electronic, Industrial and Control Engineering, pg. 564.
Laurie Segall,(2011)."Wordpress hammered by massive DdoSattack,". Available at:http://money.cnn.com/2011/03/03/technology/wordpress_attack/index.htm.
Liu J., Xiao Y., Ghaboosi K., Deng H., and Zhang J.,(2009).Botnet:Classification, Attacks, Detection, Tracing, and Preventive Measures,EURASIP Journal on Wireless Communications and Networking, vol.2009, Article ID 692654, 11 pages.
Loukas G. and Oke G.(2009). Protection against Denial of Service Attacks: A Survey.
McPhersonD., (2010). “Worldwide Infrastructure SecurityReport," Arbor Networks, availableat:http://ipv6.org.sa/sites/default/files/World_Infrastructure_Security_Report_ 2011.pdf.
MirkovicJ.,and ReiherP.,(2004)A taxonomy of DDoS attack and DDoS defensemechanisms, ACM SIGCOMM Computer Communications Review, vol.34, no. 2, pp. 39-53.
Mohammed A. S. and Azizah A., (2015). Denial of Service and Distributed Denial of Service Attacks,A Novel Protective Framework for Defeating HTTP-Basedavailable at http://dx.doi.org/10.1155/2015/238230
Monika S., Gurvinder S., Krishan K., and Kuldip S., (2010). DDoS Incidents and their Impact: A Review, The International Arab Journal of Information Technology, Vol. 7, No. 1.
NSFOCUS, (2013) "Mid year DDoS threat report 2013," http://en.nsfocus.com/SecurityReport/2013%20NSFOCUS%20Mid-Year%20DDoS%20Threat%20Report.pdf.
Operation Payback cripples MasterCard site inrevenge for WikiLeaks ban, Dec. 8, 2010, available athttp://www.guardian.co.uk/media/2010/dec/08/operation–payback–mastercard–website–wikileaks.
PaliwalN.SinghR.Deepak R. and RanaS.(2014) Survey of Botnet Based DDoS Attack and Recent DDoS IncidentsInternational Journal of Advanced Research in Computer Science and Software Engineering, pp. 1452-1458)
PuriR.,(2003)‘Bots and Botnet –an overview’ available at http://www.giac.org/practical/GSEC/RamneekPuriGSEC.pdf.
Radunovic V. J.,(2013)"DDoS -Available Weapon of Mass Disruption," in 21st Telecommunications forum TELFOR 2013 Serbia, Belgrade.
Raghav V., Nitika C. and Jyoteesh M. (2015). Impact Evaluation of Distributed Denial of Service Attacks using NS2, International Journal of Security and Its Applications Vol.9, pp.303-316 http://dx.doi.org/10.14257/ijsia.2015.9.8.27
SomaiyaR.,(2011)."Hackers Shut Down Government Sites,"Available at:http://www.nytimes.com/2011/02/03/world/middleeast/03hackers.html?_r=2.
Specht S M. and Lee R. B.,(2004).Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. Proceedingsof the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security inParallel and Distributed Systems, pp. 543-550.
Sven DietrichN.L., DittrichD.,(2000)"AnalyzingDistributed Denial 0f Service Tools: The Shaft Case," Proceedings of the 14th Systems AdministrationConference (LISA 2000), New Orleans, Louisiana, USA, pg. 12.
TakahashiD., "Hackers deny involvement in PlayStationNetwork outage,". Available at:http://venturebeat.com/2011/04/22/as-playstationnetwork-outage-continues-hackers-deny-involvement
The journal.ie,(2011)."Fine Gael website defaced byAnonymous ̳hacktivists‘,". Available at:http://www.thejournal.ie/fine-gael-website-defaced-byanonymous-hacktivists-2011-01.
ToddB., (2000) ‘Distributed Denial of Service Attacks’,available athttp://www.linuxsecurity.com/resourcefiles/intrusiondetection/ddos–whitepaper.html.
Usman T., Yasir M., Bessam A., (2012). Defense and Monitoring Model for DistributedDenial of Service Attacks,The 2nd International Workshop on Internet of Ubiquitous and Pervasive Things (IUPT 2012).
Wired.com, (2000).“Yahoo on Trail of Site Hackers”. Available at http://www.wired.com/news/business/0,1367,34221,00.html.
ZargarS. T.,JoshiJ., and TipperD., Senior(2012)"A Survey of defence Mechanism Against Distributed Denial of Service(DDoS) flooding attacks," IEEE Communication Survey & Tutorials.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 gnpublication@
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in