Reference Hub9
A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms

A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms

Brij B. Gupta, Amrita Dahiya, Chivesh Upneja, Aditi Garg, Ruby Choudhary
Copyright: © 2020 |Pages: 33
ISBN13: 9781799822424|ISBN10: 1799822427|EISBN13: 9781799822431
DOI: 10.4018/978-1-7998-2242-4.ch010
Cite Chapter Cite Chapter

MLA

Gupta, Brij B., et al. "A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms." Handbook of Research on Intrusion Detection Systems, edited by Brij B. Gupta and Srivathsan Srinivasagopalan, IGI Global, 2020, pp. 186-218. https://doi.org/10.4018/978-1-7998-2242-4.ch010

APA

Gupta, B. B., Dahiya, A., Upneja, C., Garg, A., & Choudhary, R. (2020). A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms. In B. Gupta & S. Srinivasagopalan (Eds.), Handbook of Research on Intrusion Detection Systems (pp. 186-218). IGI Global. https://doi.org/10.4018/978-1-7998-2242-4.ch010

Chicago

Gupta, Brij B., et al. "A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms." In Handbook of Research on Intrusion Detection Systems, edited by Brij B. Gupta and Srivathsan Srinivasagopalan, 186-218. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2242-4.ch010

Export Reference

Mendeley
Favorite

Abstract

DDoS attack always takes advantage of structure of Internet and imbalance of resources between defender and attacker. DDoS attacks are driven by factors like interdependency of Internet's security, limited resources, fewer incentives for home users and local ISPs, flexibility of handlers to control multiple compromised systems at the same time, untraceable nature of malicious packets and unfair distribution of resources all over the Internet. This survey chapter gives a comprehensive view on DDoS attacks and its defense mechanisms. Defense mechanisms are categorized according to the deployment position and nature of defense. Comprehensive study of DDoS attacks will definitely help researchers to understand the important issues related to cyber security.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.