{"title":"Evaluation of mitigation methods for distributed denial of service attacks","authors":"R. Robinson, Ciza Thomas","doi":"10.1109/ICIEA.2012.6360818","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service attacks of today present a difficult challenge to the network administrators as well as to the users of the Internet. Distributed Denial of Service war field launched by hackers using malicious botnets are evolving day by day. As new countermeasures are developed or mitigate Distributed Denial of Service attacks, attackers are constantly developing new methods to circumvent them. The threats and consequences presented by denial of service attacks are analyzed in this paper. The nature of the attacks, and an attempt to explain what the true motives behind these attacks have been done. The different mitigation processes of Distributed Denial of Service attacks in different situations have been analyzed to explore the power of methods using Hop-Count Filtering and probabilistic approaches.","PeriodicalId":220747,"journal":{"name":"2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEA.2012.6360818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
Distributed Denial of Service attacks of today present a difficult challenge to the network administrators as well as to the users of the Internet. Distributed Denial of Service war field launched by hackers using malicious botnets are evolving day by day. As new countermeasures are developed or mitigate Distributed Denial of Service attacks, attackers are constantly developing new methods to circumvent them. The threats and consequences presented by denial of service attacks are analyzed in this paper. The nature of the attacks, and an attempt to explain what the true motives behind these attacks have been done. The different mitigation processes of Distributed Denial of Service attacks in different situations have been analyzed to explore the power of methods using Hop-Count Filtering and probabilistic approaches.