Autors: Bosale, K. S., Nenova, M. V., Iliev, G. L.
Title: The distributed denial of service attacks (DDoS) prevention mechanisms on application layer
Keywords: App-Ddos attacks , Http Get , Http Post , Slowloris , RUDY , DNS

Abstract: As DDOS attacks interrupt internet services, DDOS tools confirm the effectiveness of the current attack. DDOS attack and countermeasures continue to increase in number and complexity. In this paper, we explore the scope of the DDoS flooding attack problem and attempts to combat it. A contemporary escalation of application layer distributed denial of service attacks on the web services has quickly transferred the focus of the research community from conventional network based denial of service. As a result, new genres of attacks were explored like HTTP GET Flood, HTTP POST Flood, Slowloris, R-U-Dead-Yet (RUDY), DNS etc. Also after a brief introduction to DDOS attacks, we discuss the characteristics of newly proposed application layer distributed denial of service attacks and embellish their impact on modern web services.

References

    Issue

    13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS), 2017, Serbia, IEEE, DOI 10.1109/TELSKS.2017.8246247

    Цитирания (Citation/s):
    1. Andre Mbundo Quingueni, Nattapong Kitsuwan, "Reduction of traffic between switches and IDS for prevention of DoS attack in SDN", Communications and Information Technologies (ISCIT) 2019 19th International Symposium on, pp. 277-281, 2019 - 2019 - в издания, индексирани в Scopus или Web of Science
    2. Yusuf Zakir, Khondker S. Hasan, Naomi S. Wiggins, Amlan Chatterjee, "Improving Data Security in Message Communication between ACT and Aircraft using Private Blockchain", Internet of Things: Systems Management and Security (IOTSMS) 2019 Sixth International Conference on, pp. 506-513, 2019. - 2019 - в издания, индексирани в Scopus или Web of Science
    3. Engr. Ali Ahmed, Huma Ali Ahmed, "A Proposed Model for Controlling Distributed Denial of Service Attack on Cloud Computing", Emerging Trends in Engineering Sciences and Technology (ICEEST) 2019 4th International Conference on, pp. 1-4, 2019 - 2019 - в издания, индексирани в Scopus или Web of Science
    4. Ganeshayya Ishwarayya Shidaganti, Amogh Shreedhar Inamdar, Sindhuja V. Rai, Anagha M. Rajeev, SCEF: A Model for Prevention of DDoS Attacks From the Cloud, International Journal of Cloud Applications and Computing (IJCAC) 10(3), DOI: 10.4018/IJCAC.2020070104, Pages: 14, 2020 - 2020 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    5. Zakir, Yusuf, Improving Aviation Data Communication and Storage Security using Blockchain Based Approach, Bachelor Thesis, University of Huston, https://hdl.handle.net/10657.1/2427, 2020 - 2020 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    6. E. A. Setyawan and F. Hidayat, "Web Services Security and Threats: A Systematic Literature Review," 2020 International Conference on ICT for Smart Society (ICISS), 2020, pp. 1-6, doi: 10.1109/ICISS50791.2020.9307569. - 2020 - в издания, индексирани в Scopus или Web of Science
    7. R. Sanjeetha, K. N. A. Shastry, H. R. Chetan and A. Kanavalli, "Mitigating HTTP GET FLOOD DDoS attack using an SDN controller," 2020 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), 2020, pp. 6-10, doi: 10.1109/RTEICT49044.2020.9315608. - 2020 - в издания, индексирани в Scopus или Web of Science
    8. Tahadray Jean Tsitaitse, Yongquan Cai and Shaldon Leparan Suntu, SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS, International Journal of Innovative Computing, Information and Control, Volume 14, Number 6, December 2018, ISSN 1349-4198, pp.2221-2243 - 2018 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    9. CHINNAIAH, Balarengadurai. Protection of DDoS Attacks at the Application Layer: HyperLogLog (HLL) Cardinality Estimation. In: Cognitive Informatics and Soft Computing. Springer, Singapore, 2021. p. 595-604. - 2021 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    10. KAURA, Pushpinder; JASWALB, Anil. Detecting and Preventing the Sybil Attack Using Sink Based Detection Mechanism in Wireless Sensor Networks. - 2019 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    11. FITRI, N. R., et al. Low interaction honeypot as the defense mechanism against Slowloris attack on the web server. In: IOP Conference Series: Materials Science and Engineering. IOP Publishing, 2020. p. 012037. - 2020 - в издания, индексирани в Scopus или Web of Science
    12. MSHANGI, Maduhu. Enhancing Security of Information Systems in Tanzania: the Case of Education Sector. 2020. PhD Thesis. The Open University of Tanzania. - 2020 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    13. TSITAITSE, Tahadray Jean; CAI, Yongquan; SUNTU, Shaldon Leparan. SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2018, 14.6: 2221-2243. - 2018 - в издания, индексирани в Scopus или Web of Science
    14. Quingueni, A. M., & Kitsuwan, N. (2019, September). Reduction of traffic between switches and IDS for prevention of DoS attack in SDN. In 2019 19th International Symposium on Communications and Information Technologies (ISCIT) (pp. 277-281). IEEE. - 2019 - в издания, индексирани в Scopus или Web of Science
    15. Kaur, M., Sagar, A., & Singh, B. (2019). A Proposed Approach to Detect Sybil Attack Using SBDM in Wireless Sensor Networks. International Journal on Future Revolution in Computer Science & Communication Engineering, 5(5), 06-09. - 2019 - в издания, индексирани в Scopus или Web of Science
    16. BALAREZO, Juan Fernando, et al. A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Engineering Science and Technology, an International Journal, 2021 - 2021 - в издания, индексирани в Scopus или Web of Science
    17. Chen, H., Meng, C., & Chen, J. (2021). DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment. International Journal of Information Security and Privacy (IJISP), 15(3), 1-18 - 2021 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    18. DA FONSECA, Fabio Miguel Blasak; DE SOUZA, Tiago Fatturi. Auditing databases for security vulnerabilities. U.S. Patent No 10,938,849, 2021 - 2021 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    19. Radain, D., Almalki, S., Alsaadi, H., & Salama, S. (2021, March). A Review on Defense Mechanisms Against Distributed Denial of Service (DDoS) Attacks on Cloud Computing. In 2021 International Conference of Women in Data Science at Taif University (WiDSTaif) (pp. 1-6). IEEE. - 2021 - в издания, индексирани в Scopus или Web of Science
    20. Calvert, C. (2019). Data Collection Framework and Machine Learning Algorithms for the Analysis of Cyber Security Attacks (Doctoral dissertation, Florida Atlantic University). - 2019 - в издания, индексирани в Scopus или Web of Science
    21. Wang, X., Tu, S., Zhao, W., & Shi, C. (2021). A novel energy-based online sequential extreme learning machine to detect anomalies over real-time data streams. Neural Computing and Applications, 1-9. - 2021 - в издания, индексирани в Scopus или Web of Science
    22. Yudhana, A., Riadi, I., & Suharti, S. (2021). Distributed Denial of Service (DDoS) Analysis on Virtual Network and Real Network Traffic. JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING, 5(1), 112-121. - 2021 - в издания, индексирани в Scopus или Web of Science
    23. Toapanta, S. M. T., Tapia, D. T., & Gallegos, L. E. M. (2019, December). An approach of cyberattacks with the use of social networks and communication media for public organizations of the ecuador. In Proceedings of the 2019 2nd International Conference on Education Technology Management (pp. 67-72). - 2019 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    24. HALIM, Iman Hazwam Abd, et al. Reducing Honeypot Log Storage Capacity Consumption--Cron Job with Perl-Script Approach. arXiv preprint arXiv:1911.07633, 2019. - 2019 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
    25. CALVERT, Chad, et al. Detecting slow http post dos attacks using netflow features. In: The thirty-second international FLAIRS conference. 2019. - 2019 - в издания, индексирани в Scopus или Web of Science
    26. Eriyanto Adhi Setyawan, Fadhil Hidayat, "Web Services Security and Threats: A Systematic Literature Review", ICT for Smart Society (ICISS) 2020 International Conference on, vol. CFP2013V-ART, pp. 1-6, 2020 - 2020 - в издания, индексирани в Scopus или Web of Science
    27. R. Lakshmana Kumar, Quoc-Viet Pham, Firoz Khan, Md. Jalil Piran, Kapal Dev, "Blockchain for securing aerial communications: Potentials solutions and research directions", Physical Communication, vol. 47, pp. 101390, Elsevier, 2021 - 2021 - в издания, индексирани в Scopus или Web of Science
    28. Keerthan Kumar T.G., Srikanth M.S., Sharma V., Anand Babu J. (2022) Performance Evaluation of Packet Injection and DOS Attack Controller Software (PDACS) Module. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_60 - 2022 - в издания, индексирани в Scopus или Web of Science

    Вид: публикация в международен форум, публикация в реферирано издание, индексирана в Scopus и Web of Science