{"title":"Characterization and comparison of Distributed Denial of Service attack tools","authors":"Harjeet Kaur, Sunny Behal, Krishan Kumar","doi":"10.1109/ICGCIOT.2015.7380634","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service (DDoS) attack is a prime threat for the extensively used Internet based services like e-commerce, banking, medicine, education etc. Hackers launch DDoS attacks by compromising the vulnerable systems (called bots) in order to degrade or sometimes completely disrupt these services. In recent years, DDoS attacks have been increased in strength, frequency and sophistication. Though many solutions have been proposed in literature to combat against such attacks but still defending from a DDoS attack is a challenging issue. Hackers are continuously upgrading their skills to launch diversified attacks and are developing new means to circumvent these countermeasures. The purpose of this paper is to characterize and compare the popular DDoS attack tools used by the attackers in recent times, their modus operandi and types of attacks, they launch. This would help the researcher community to handpick the appropriate DDoS attack tool for their experimentation purpose.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGCIOT.2015.7380634","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
Distributed Denial of Service (DDoS) attack is a prime threat for the extensively used Internet based services like e-commerce, banking, medicine, education etc. Hackers launch DDoS attacks by compromising the vulnerable systems (called bots) in order to degrade or sometimes completely disrupt these services. In recent years, DDoS attacks have been increased in strength, frequency and sophistication. Though many solutions have been proposed in literature to combat against such attacks but still defending from a DDoS attack is a challenging issue. Hackers are continuously upgrading their skills to launch diversified attacks and are developing new means to circumvent these countermeasures. The purpose of this paper is to characterize and compare the popular DDoS attack tools used by the attackers in recent times, their modus operandi and types of attacks, they launch. This would help the researcher community to handpick the appropriate DDoS attack tool for their experimentation purpose.