Akash Sharma, Deepanshu Batra, Rajat Pandey, Priti Narwal, Vinay Kumar
{"title":"分布式拒绝服务攻击及其应对策略","authors":"Akash Sharma, Deepanshu Batra, Rajat Pandey, Priti Narwal, Vinay Kumar","doi":"10.6025/IJWA/2018/10/3/91-99","DOIUrl":null,"url":null,"abstract":"91 ABSTRACT: Since past few years, there has been a rapid increase in use of attacks or cyber crime over the cyber space and one of the most common attacks used is the distributed denial of service attack. These attacks leads for use in the variety of both the attacks and the defence approaches. In this paper, classification of the available mechanisms which are proposed in the literature on how to keep the cyber space away from the possible DDoS attacks and discuss the strong and weak points of each mechanism. This provides the better understanding of the problem and enables a security administrator to effectively equip his storages with proper prevention mechanisms for fighting against DDoS attacks. The paper investigated multiple nature of the problem and look for its causes, further presenting brief insights and suggested approaches for defending against DDoS attack.","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Distributed Denial of Service Attack and its Countermeasures\",\"authors\":\"Akash Sharma, Deepanshu Batra, Rajat Pandey, Priti Narwal, Vinay Kumar\",\"doi\":\"10.6025/IJWA/2018/10/3/91-99\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"91 ABSTRACT: Since past few years, there has been a rapid increase in use of attacks or cyber crime over the cyber space and one of the most common attacks used is the distributed denial of service attack. These attacks leads for use in the variety of both the attacks and the defence approaches. In this paper, classification of the available mechanisms which are proposed in the literature on how to keep the cyber space away from the possible DDoS attacks and discuss the strong and weak points of each mechanism. This provides the better understanding of the problem and enables a security administrator to effectively equip his storages with proper prevention mechanisms for fighting against DDoS attacks. The paper investigated multiple nature of the problem and look for its causes, further presenting brief insights and suggested approaches for defending against DDoS attack.\",\"PeriodicalId\":448883,\"journal\":{\"name\":\"Int. J. Web Appl.\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Web Appl.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.6025/IJWA/2018/10/3/91-99\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Web Appl.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.6025/IJWA/2018/10/3/91-99","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Distributed Denial of Service Attack and its Countermeasures
91 ABSTRACT: Since past few years, there has been a rapid increase in use of attacks or cyber crime over the cyber space and one of the most common attacks used is the distributed denial of service attack. These attacks leads for use in the variety of both the attacks and the defence approaches. In this paper, classification of the available mechanisms which are proposed in the literature on how to keep the cyber space away from the possible DDoS attacks and discuss the strong and weak points of each mechanism. This provides the better understanding of the problem and enables a security administrator to effectively equip his storages with proper prevention mechanisms for fighting against DDoS attacks. The paper investigated multiple nature of the problem and look for its causes, further presenting brief insights and suggested approaches for defending against DDoS attack.