{"title":"评估分布式拒绝服务攻击的缓解方法","authors":"R. Robinson, Ciza Thomas","doi":"10.1109/ICIEA.2012.6360818","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service attacks of today present a difficult challenge to the network administrators as well as to the users of the Internet. Distributed Denial of Service war field launched by hackers using malicious botnets are evolving day by day. As new countermeasures are developed or mitigate Distributed Denial of Service attacks, attackers are constantly developing new methods to circumvent them. The threats and consequences presented by denial of service attacks are analyzed in this paper. The nature of the attacks, and an attempt to explain what the true motives behind these attacks have been done. The different mitigation processes of Distributed Denial of Service attacks in different situations have been analyzed to explore the power of methods using Hop-Count Filtering and probabilistic approaches.","PeriodicalId":220747,"journal":{"name":"2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Evaluation of mitigation methods for distributed denial of service attacks\",\"authors\":\"R. Robinson, Ciza Thomas\",\"doi\":\"10.1109/ICIEA.2012.6360818\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Distributed Denial of Service attacks of today present a difficult challenge to the network administrators as well as to the users of the Internet. Distributed Denial of Service war field launched by hackers using malicious botnets are evolving day by day. As new countermeasures are developed or mitigate Distributed Denial of Service attacks, attackers are constantly developing new methods to circumvent them. The threats and consequences presented by denial of service attacks are analyzed in this paper. The nature of the attacks, and an attempt to explain what the true motives behind these attacks have been done. The different mitigation processes of Distributed Denial of Service attacks in different situations have been analyzed to explore the power of methods using Hop-Count Filtering and probabilistic approaches.\",\"PeriodicalId\":220747,\"journal\":{\"name\":\"2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIEA.2012.6360818\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEA.2012.6360818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation of mitigation methods for distributed denial of service attacks
Distributed Denial of Service attacks of today present a difficult challenge to the network administrators as well as to the users of the Internet. Distributed Denial of Service war field launched by hackers using malicious botnets are evolving day by day. As new countermeasures are developed or mitigate Distributed Denial of Service attacks, attackers are constantly developing new methods to circumvent them. The threats and consequences presented by denial of service attacks are analyzed in this paper. The nature of the attacks, and an attempt to explain what the true motives behind these attacks have been done. The different mitigation processes of Distributed Denial of Service attacks in different situations have been analyzed to explore the power of methods using Hop-Count Filtering and probabilistic approaches.