Priyanka Kamboj, M. Trivedi, Virendra Kumar Yadav, V. Singh
{"title":"Detection techniques of DDoS attacks: A survey","authors":"Priyanka Kamboj, M. Trivedi, Virendra Kumar Yadav, V. Singh","doi":"10.1109/UPCON.2017.8251130","DOIUrl":null,"url":null,"abstract":"Security is the main confront of internet, Distributed Denial of Service (DDoS) is the major cause of threat. DDoS reduces the network resources, and results in bandwidth depletion. The main aim of DDoS is to prevent legitimate users from assessing the services. There also exists a difficulty to differentiate between flash crowd and DDoS attack traffic. The various existing solutions which are given in order to detect DDoS has been discussed in this paper. The goal of the paper is to review how the different methods are helping in downsizing the effect of DDoS and also how that are being used to detect a DDoS attack.","PeriodicalId":422673,"journal":{"name":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"25","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UPCON.2017.8251130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 25
Abstract
Security is the main confront of internet, Distributed Denial of Service (DDoS) is the major cause of threat. DDoS reduces the network resources, and results in bandwidth depletion. The main aim of DDoS is to prevent legitimate users from assessing the services. There also exists a difficulty to differentiate between flash crowd and DDoS attack traffic. The various existing solutions which are given in order to detect DDoS has been discussed in this paper. The goal of the paper is to review how the different methods are helping in downsizing the effect of DDoS and also how that are being used to detect a DDoS attack.