Study and Evaluation of Recent DDOS Trends of Attack on Web Server

Authors

  • Amadi E. C. Department of Informaion Management Technology, Federal University Technologyi Owerri (FUTO), Nigeria
  • Anakenyi D. Department of Informaion Management Technology, Federal University Technologyi Owerri (FUTO), Nigeria
  • Njoku C. Department of Informaion Management Technology, Federal University Technologyi Owerri (FUTO), Nigeria
  • Abanobi G. Department of Informaion Management Technology, Federal University Technologyi Owerri (FUTO), Nigeria

DOI:

https://doi.org/10.53555/cse.v2i6.181

Keywords:

Distributed Denial of Service (DDoS), DDOS attacks,, DDOS Incidents,, Web Server.

Abstract

Distributed Denial of Service (DDoS) attacks have become a major threat to the Internet community
because DDoS attacks are regularly launched by well organized and widely spread botnet computers that are concurrently and accordingly sending large amount of traffic or service request to the target system. The target system either responds so slowly or crashes completely. These attacks not only congest a Server, but also affect the performance of other Servers on the entire network also, which are connected to Backbone Link directly or indirectly. The focus of this study, based on existing literature, covers the architecture or models of DDoS attacks and DDoS attack tools, propose taxonomies to characterize the scope of DDoS attacks and categorize it based on their types, and also the recent trends of DDoS attacks on web server are studied and evaluated.

Downloads

Download data is not yet available.

References

AlomariE., ManickamS., GuptaB., KaruppayahS, and AlfarisR., (2012) "Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art," International Journal of Computer Applications (0975 –8887), vol. 49.

AroraK., KumarK., SachdevaM.,(2011). ”Impact Analysis of Recent DdoS Attacks”, International Journal of ComputerScience and Engineering., ISSN 0975-3397,Vol. 3,pp 877-884.

B. L. Communication,(2014)"Threat Report," http://www.blacklotus.net/wp-content/uploads/Black-Lotus-Threat-Report-Volume-I-Issue-3-21-April-2014, vol. 1.

Bysin, (2001). “knight.c sourcecode,". Available at:http://packetstormsecurity.org/distributed/knight.c

CERT,(2001)‘Denial of Service Attacks’available at http://www.cert.org/tech tips/denialofservice.html

CERT Coordination Center, (2001)Trends in Denial of Serviceattack technology, Available from http://www.cert.org/archive/pdf/DoS_trends.pdf.

Chang R. K. C.,(2002)Defending against flooding-based distributed denial ofservice attacks: A tutorial, Computer journal of IEEE CommunicationsMagazine, Vol. 40, no. 10, pp. 42-51.

Christos D. and Aikaterini M.(2004). “DDoS attacks and defense mechanisms: classificationand state-of-the-art”Available at http://www.sciencedirect.com. Computer Networks pg. 643–666.

Cichardson R., (2007). “Computer Crime and SecuritySurvey,” available at http://www.crime-research.org/news/11.06.2004/423.

CompanyV.,(2006)"Distributed Denial of Service (DDoS) andBotnet Attacks," An iDefense Security Report.

CriscuoloP. J.,(2000),Distributed Denial of Service, Tribe Flood Network 2000,and Stacheldraht CIAC-2319, Department of Energy Computer IncidentAdvisory Capability (CIAC), UCRL-ID-136939, Rev. 1., LawrenceLivermore National Laboratory.

Daljeet K., MonicaS., Krishan K.,(2012)"Recent DDoS Incidents and Their Impact," International Journal of Scientific &Engineering Research, vol. 3.

Daljeet K. and Monika S.(2014). “Impact Analysis of DDoS Attacks on FTP Services”,Proc. of Int. Conf. on Recent Trends in Information, Telecommunication and Computing, Journal of Association of Computer Electronics and Electrical Engineers pg. 220-228.

Dhruv A. P., Prof Patel H.(2014). Detection and Mitigation of DDOS Attack against Web Server, International Journal of Engineering Development and Research, vol. 2.

FBI, "Justice Department Charges Leaders of Megaupload withWidespread Online Copyright Infringement," 2012. Available at: http://www.fbi.gov/news/pressrel/press-releases/justice-department-charges-leaders-of-megaupload-with-widespread-online-copyright-infringement.

Gonsalves C., (2007). Akamai.DDoS Attack WhacksWeb Traffic, available at http://www.eweek.com/article2/0,1895,1612739,00.Asp.

Gordon A., Loeb P., Lucysgyn W., andRichardson R.,(200)CSI/FBI Computer Crime andSecurity Survey, CSI Publications.

Gupta B. B., Joshi R. C., Misra M.,(2010).Distributed Denialof Service Prevention Techniques, International Journalof Computer and Electrical Engineering (IJCEE), vol. 2,number 2, pp. 268-276.

Headlines,(2012)"DDoS Attacks Against Government and Entertainment Websites Escalate,". Available at: http://www.infosecisland.com/blogview/19543-DDoS-Attacks-Against-Government-and-Entertainment-Websites-Escalate.html.

HancockB., (2001) "Trinity v3, a DDoStool, hits the streets,"Computers & Security, vol. 19, pp. 574-574.

ITworld.com. (2001) "CERT hit by DDoS attack for a third day,". Available at: http://www.itworld.com/IDG010524CERT2

KernerS.M.,(2011)."DDoS Attacks on the Rise," 2011.Available at:http://www.esecurityplanet.com/trends/article.php/3932976/DDoS-Attacks-on-the-Rise.htm

KittenT., DDoS: Lessons from Phase 2 Attacks, available at http://www.bankinfosecurity.com/ddos-attacks-lessons-from-phase-2-a-5420/op-1

Lai S. and Wang M.(2014) “Principal Analysis and Defense Technologies of Application Layer DDos Attacks”. Journal of International Conference on Mechatronics, Electronic, Industrial and Control Engineering, pg. 564.

Laurie Segall,(2011)."Wordpress hammered by massive DdoSattack,". Available at:http://money.cnn.com/2011/03/03/technology/wordpress_attack/index.htm.

Liu J., Xiao Y., Ghaboosi K., Deng H., and Zhang J.,(2009).Botnet:Classification, Attacks, Detection, Tracing, and Preventive Measures,EURASIP Journal on Wireless Communications and Networking, vol.2009, Article ID 692654, 11 pages.

Loukas G. and Oke G.(2009). Protection against Denial of Service Attacks: A Survey.

McPhersonD., (2010). “Worldwide Infrastructure SecurityReport," Arbor Networks, availableat:http://ipv6.org.sa/sites/default/files/World_Infrastructure_Security_Report_ 2011.pdf.

MirkovicJ.,and ReiherP.,(2004)A taxonomy of DDoS attack and DDoS defensemechanisms, ACM SIGCOMM Computer Communications Review, vol.34, no. 2, pp. 39-53.

Mohammed A. S. and Azizah A., (2015). Denial of Service and Distributed Denial of Service Attacks,A Novel Protective Framework for Defeating HTTP-Basedavailable at http://dx.doi.org/10.1155/2015/238230

Monika S., Gurvinder S., Krishan K., and Kuldip S., (2010). DDoS Incidents and their Impact: A Review, The International Arab Journal of Information Technology, Vol. 7, No. 1.

NSFOCUS, (2013) "Mid year DDoS threat report 2013," http://en.nsfocus.com/SecurityReport/2013%20NSFOCUS%20Mid-Year%20DDoS%20Threat%20Report.pdf.

Operation Payback cripples MasterCard site inrevenge for WikiLeaks ban, Dec. 8, 2010, available athttp://www.guardian.co.uk/media/2010/dec/08/operation–payback–mastercard–website–wikileaks.

PaliwalN.SinghR.Deepak R. and RanaS.(2014) Survey of Botnet Based DDoS Attack and Recent DDoS IncidentsInternational Journal of Advanced Research in Computer Science and Software Engineering, pp. 1452-1458)

PuriR.,(2003)‘Bots and Botnet –an overview’ available at http://www.giac.org/practical/GSEC/RamneekPuriGSEC.pdf.

Radunovic V. J.,(2013)"DDoS -Available Weapon of Mass Disruption," in 21st Telecommunications forum TELFOR 2013 Serbia, Belgrade.

Raghav V., Nitika C. and Jyoteesh M. (2015). Impact Evaluation of Distributed Denial of Service Attacks using NS2, International Journal of Security and Its Applications Vol.9, pp.303-316 http://dx.doi.org/10.14257/ijsia.2015.9.8.27

SomaiyaR.,(2011)."Hackers Shut Down Government Sites,"Available at:http://www.nytimes.com/2011/02/03/world/middleeast/03hackers.html?_r=2.

Specht S M. and Lee R. B.,(2004).Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures. Proceedingsof the 17th International Conference on Parallel and Distributed Computing Systems, 2004 International Workshop on Security inParallel and Distributed Systems, pp. 543-550.

Sven DietrichN.L., DittrichD.,(2000)"AnalyzingDistributed Denial 0f Service Tools: The Shaft Case," Proceedings of the 14th Systems AdministrationConference (LISA 2000), New Orleans, Louisiana, USA, pg. 12.

TakahashiD., "Hackers deny involvement in PlayStationNetwork outage,". Available at:http://venturebeat.com/2011/04/22/as-playstationnetwork-outage-continues-hackers-deny-involvement

The journal.ie,(2011)."Fine Gael website defaced byAnonymous ̳hacktivists‘,". Available at:http://www.thejournal.ie/fine-gael-website-defaced-byanonymous-hacktivists-2011-01.

ToddB., (2000) ‘Distributed Denial of Service Attacks’,available athttp://www.linuxsecurity.com/resourcefiles/intrusiondetection/ddos–whitepaper.html.

Usman T., Yasir M., Bessam A., (2012). Defense and Monitoring Model for DistributedDenial of Service Attacks,The 2nd International Workshop on Internet of Ubiquitous and Pervasive Things (IUPT 2012).

Wired.com, (2000).“Yahoo on Trail of Site Hackers”. Available at http://www.wired.com/news/business/0,1367,34221,00.html.

ZargarS. T.,JoshiJ., and TipperD., Senior(2012)"A Survey of defence Mechanism Against Distributed Denial of Service(DDoS) flooding attacks," IEEE Communication Survey & Tutorials.

Downloads

Published

2016-06-30

How to Cite

E. C. , A., D., A., C. , N., & G. , A. (2016). Study and Evaluation of Recent DDOS Trends of Attack on Web Server. International Journal For Research In Advanced Computer Science And Engineering, 2(6), 01–10. https://doi.org/10.53555/cse.v2i6.181