A Survey on Denial of Service Attacks and Preclusions

A Survey on Denial of Service Attacks and Preclusions

Nagesh K., Sumathy R., Devakumar P., Sathiyamurthy K.
Copyright: © 2021 |Pages: 18
DOI: 10.4018/978-1-7998-5348-0.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.
Chapter Preview
Top

Ddos Filtering Process

The Figure 1 presents the process of Distributed Denial of Service as follows:

  • Initially, the hacker attempt to gather information about the targeted system;

  • Next step, using any basic techniques exploits the weakness of the system;

  • DDOS sensor (any related mechanisms) is used to detect and filter these attacks;

  • DDOS filter (any related tools), removes the detected attacks;

  • Finally, the distributed customers can utilize the network without any issues.

Figure 1.

Distributed denial of service

978-1-7998-5348-0.ch012.f01

Complete Chapter List

Search this Book:
Reset