A Survey on Denial of Service Attacks and Preclusions

A Survey on Denial of Service Attacks and Preclusions

Nagesh K. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Sumathy R. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India), Devakumar P. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India) and Sathiyamurthy K. (Pondicherry Engineering College, Department of Computer Science and Engineering, Puducherry, India)
Copyright: © 2017 |Pages: 15
DOI: 10.4018/IJISP.2017100101
OnDemand PDF Download:
$37.50

Abstract

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.
Article Preview

Ddos Filtering Process

The Figure 1 presents the process of Distributed Denial of Service as follows:

  • Initially, the hacker attempt to gather information about the targeted system;

  • Next step, using any basic techniques exploits the weakness of the system;

  • DDOS sensor (any related mechanisms) is used to detect and filter these attacks;

  • DDOS filter (any related tools), removes the detected attacks;

  • Finally, the distributed customers can utilize the network without any issues.

Figure 1.

Distributed denial of service

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing