Flooding distributed denial of service attacks-A review

Khadijah Wan Mohd Ghazali, Rosilah Hassan

Research output: Contribution to journalArticle

13 Citations (Scopus)

Abstract

Problem statement: Flaws either in users' implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

Original languageEnglish
Pages (from-to)1218-1223
Number of pages6
JournalJournal of Computer Science
Volume7
Issue number8
DOIs
Publication statusPublished - 2011

Fingerprint

Denial-of-service attack
Specifications
Defects

Keywords

  • Active queue management (AQM)
  • Denial of service
  • Distributed denial of service (DDOS)
  • Flood attacks
  • High-rate flood
  • International telecommunication union's (ITU)
  • Low-rate flood
  • Time-out (RTO)
  • UDP flood attack

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Artificial Intelligence

Cite this

Flooding distributed denial of service attacks-A review. / Ghazali, Khadijah Wan Mohd; Hassan, Rosilah.

In: Journal of Computer Science, Vol. 7, No. 8, 2011, p. 1218-1223.

Research output: Contribution to journalArticle

Ghazali, Khadijah Wan Mohd ; Hassan, Rosilah. / Flooding distributed denial of service attacks-A review. In: Journal of Computer Science. 2011 ; Vol. 7, No. 8. pp. 1218-1223.
@article{56325368ed2149568d6daafa18148130,
title = "Flooding distributed denial of service attacks-A review",
abstract = "Problem statement: Flaws either in users' implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.",
keywords = "Active queue management (AQM), Denial of service, Distributed denial of service (DDOS), Flood attacks, High-rate flood, International telecommunication union's (ITU), Low-rate flood, Time-out (RTO), UDP flood attack",
author = "Ghazali, {Khadijah Wan Mohd} and Rosilah Hassan",
year = "2011",
doi = "10.3844/jcssp.2011.1218.1223",
language = "English",
volume = "7",
pages = "1218--1223",
journal = "Journal of Computer Science",
issn = "1549-3636",
publisher = "Science Publications",
number = "8",

}

TY - JOUR

T1 - Flooding distributed denial of service attacks-A review

AU - Ghazali, Khadijah Wan Mohd

AU - Hassan, Rosilah

PY - 2011

Y1 - 2011

N2 - Problem statement: Flaws either in users' implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

AB - Problem statement: Flaws either in users' implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

KW - Active queue management (AQM)

KW - Denial of service

KW - Distributed denial of service (DDOS)

KW - Flood attacks

KW - High-rate flood

KW - International telecommunication union's (ITU)

KW - Low-rate flood

KW - Time-out (RTO)

KW - UDP flood attack

UR - http://www.scopus.com/inward/record.url?scp=80053102937&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80053102937&partnerID=8YFLogxK

U2 - 10.3844/jcssp.2011.1218.1223

DO - 10.3844/jcssp.2011.1218.1223

M3 - Article

AN - SCOPUS:80053102937

VL - 7

SP - 1218

EP - 1223

JO - Journal of Computer Science

JF - Journal of Computer Science

SN - 1549-3636

IS - 8

ER -