Distributed Denial of Service Attacks in Networks

Distributed Denial of Service Attacks in Networks

Udaya Kiran Tupakula
Copyright: © 2009 |Pages: 13
ISBN13: 9781599048550|ISBN10: 1599048558|EISBN13: 9781599048567
DOI: 10.4018/978-1-59904-855-0.ch008
Cite Chapter Cite Chapter

MLA

Kiran Tupakula, Udaya. "Distributed Denial of Service Attacks in Networks." Handbook of Research on Information Security and Assurance, edited by Jatinder N. D. Gupta and Sushil Sharma, IGI Global, 2009, pp. 85-97. https://doi.org/10.4018/978-1-59904-855-0.ch008

APA

Kiran Tupakula, U. (2009). Distributed Denial of Service Attacks in Networks. In J. Gupta & S. Sharma (Eds.), Handbook of Research on Information Security and Assurance (pp. 85-97). IGI Global. https://doi.org/10.4018/978-1-59904-855-0.ch008

Chicago

Kiran Tupakula, Udaya. "Distributed Denial of Service Attacks in Networks." In Handbook of Research on Information Security and Assurance, edited by Jatinder N. D. Gupta and Sushil Sharma, 85-97. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-59904-855-0.ch008

Export Reference

Mendeley
Favorite

Abstract

In this chapter we discuss Distributed Denial of Service (DDoS) attacks in networks such as the Internet, which have become significantly prevalent over the recent years. We explain how DDoS attacks are performed and consider the ideal solution characteristics for defending against the DDoS attacks in the Internet. Then we present different research directions and thoroughly analyse some of the important techniques that have been recently proposed. Our analysis confirms that none of the proposed techniques can efficiently and completely counteract the DDoS attacks. Furthermore, as networks become more complex, they become even more vulnerable to DoS attacks when some of the proposed techniques are deployed in the Internet. The gap between the tools that can generate DDoS attacks and the tools that can detect or prevent DDoS attacks continues to increase. Finally, we briefly outline some best practices that the users are urged to follow to minimise the DoS attacks in the Internet.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.