分布式拒绝服务攻击:威胁还是挑战

Q2 Social Sciences
Jasmeen Kaur Chahal, A. Bhandari, Sunny Behal
{"title":"分布式拒绝服务攻击:威胁还是挑战","authors":"Jasmeen Kaur Chahal, A. Bhandari, Sunny Behal","doi":"10.1080/13614576.2019.1611468","DOIUrl":null,"url":null,"abstract":"ABSTRACT In today’s cyber world, the Internet has become a vital resource for providing a plethora of services. Unavailability of these services due to any reason leads to huge financial implications or even consequences on society. Distributed Denial of Service (DDoS) attacks have emerged as one of the most serious threats to the Internet whose aim is to completely deny the availability of different Internet based services to legitimate users. The attackers compromise a large number of Internet enabled devices and gain malicious control over them by exploiting their vulnerabilities. Simplicity of launching, traffic variety, IP spoofing, high volume traffic, involvement of numerous agent machines, and weak spots in Internet topology are important characteristics of DDoS attacks and makes its defense very challenging. This article provides a survey with the enhanced taxonomies of DDoS attacks and defense mechanisms. Additionally, we describe the timeline of DDoS attacks to date and attempt to discuss its impact according to various motivations. We highlighted the general issues, challenges, and current trends of DDoS attack technology. The aim of the article is to provide complete knowledge of DDoS attacks and defense mechanisms to the research community. This will, in turn, help to develop a powerful, effective, and efficient defense mechanism by filling the various research gaps addressed in already proposed defense mechanisms.","PeriodicalId":35726,"journal":{"name":"New Review of Information Networking","volume":"24 1","pages":"103 - 31"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13614576.2019.1611468","citationCount":"20","resultStr":"{\"title\":\"Distributed Denial of Service Attacks: A Threat or Challenge\",\"authors\":\"Jasmeen Kaur Chahal, A. Bhandari, Sunny Behal\",\"doi\":\"10.1080/13614576.2019.1611468\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT In today’s cyber world, the Internet has become a vital resource for providing a plethora of services. Unavailability of these services due to any reason leads to huge financial implications or even consequences on society. Distributed Denial of Service (DDoS) attacks have emerged as one of the most serious threats to the Internet whose aim is to completely deny the availability of different Internet based services to legitimate users. The attackers compromise a large number of Internet enabled devices and gain malicious control over them by exploiting their vulnerabilities. Simplicity of launching, traffic variety, IP spoofing, high volume traffic, involvement of numerous agent machines, and weak spots in Internet topology are important characteristics of DDoS attacks and makes its defense very challenging. This article provides a survey with the enhanced taxonomies of DDoS attacks and defense mechanisms. Additionally, we describe the timeline of DDoS attacks to date and attempt to discuss its impact according to various motivations. We highlighted the general issues, challenges, and current trends of DDoS attack technology. The aim of the article is to provide complete knowledge of DDoS attacks and defense mechanisms to the research community. This will, in turn, help to develop a powerful, effective, and efficient defense mechanism by filling the various research gaps addressed in already proposed defense mechanisms.\",\"PeriodicalId\":35726,\"journal\":{\"name\":\"New Review of Information Networking\",\"volume\":\"24 1\",\"pages\":\"103 - 31\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1080/13614576.2019.1611468\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"New Review of Information Networking\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/13614576.2019.1611468\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"New Review of Information Networking","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/13614576.2019.1611468","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 20

摘要

摘要在当今的网络世界中,互联网已经成为提供大量服务的重要资源。由于任何原因无法获得这些服务都会导致巨大的财务影响,甚至对社会造成后果。分布式拒绝服务(DDoS)攻击已成为对互联网最严重的威胁之一,其目的是完全拒绝合法用户使用不同的基于互联网的服务。攻击者破坏了大量支持互联网的设备,并利用其漏洞对其进行恶意控制。DDoS攻击的重要特点是发起简单、流量多样、IP欺骗、流量大、代理机众多、网络拓扑薄弱等,使其防御极具挑战性。本文介绍了DDoS攻击和防御机制的增强分类。此外,我们描述了迄今为止DDoS攻击的时间线,并试图根据各种动机讨论其影响。我们重点介绍了DDoS攻击技术的一般问题、挑战和当前趋势。本文的目的是为研究界提供DDoS攻击和防御机制的完整知识。这反过来将有助于通过填补已经提出的防御机制中的各种研究空白,开发一种强大、有效和高效的防御机制。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Distributed Denial of Service Attacks: A Threat or Challenge
ABSTRACT In today’s cyber world, the Internet has become a vital resource for providing a plethora of services. Unavailability of these services due to any reason leads to huge financial implications or even consequences on society. Distributed Denial of Service (DDoS) attacks have emerged as one of the most serious threats to the Internet whose aim is to completely deny the availability of different Internet based services to legitimate users. The attackers compromise a large number of Internet enabled devices and gain malicious control over them by exploiting their vulnerabilities. Simplicity of launching, traffic variety, IP spoofing, high volume traffic, involvement of numerous agent machines, and weak spots in Internet topology are important characteristics of DDoS attacks and makes its defense very challenging. This article provides a survey with the enhanced taxonomies of DDoS attacks and defense mechanisms. Additionally, we describe the timeline of DDoS attacks to date and attempt to discuss its impact according to various motivations. We highlighted the general issues, challenges, and current trends of DDoS attack technology. The aim of the article is to provide complete knowledge of DDoS attacks and defense mechanisms to the research community. This will, in turn, help to develop a powerful, effective, and efficient defense mechanism by filling the various research gaps addressed in already proposed defense mechanisms.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
New Review of Information Networking
New Review of Information Networking Social Sciences-Education
CiteScore
2.10
自引率
0.00%
发文量
2
期刊介绍: Information networking is an enabling technology with the potential to integrate and transform information provision, communication and learning. The New Review of Information Networking, published biannually, provides an expert source on the needs and behaviour of the network user; the role of networks in teaching, learning, research and scholarly communication; the implications of networks for library and information services; the development of campus and other information strategies; the role of information publishers on the networks; policies for funding and charging for network and information services; and standards and protocols for network applications.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信