On Distributed Denial of Service Current Defense Schemes
Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attacke...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-01-01
|
Series: | Technologies |
Subjects: | |
Online Access: | https://www.mdpi.com/2227-7080/7/1/19 |
_version_ | 1811310033099554816 |
---|---|
author | Seth Djane Kotey Eric Tutu Tchao James Dzisi Gadze |
author_facet | Seth Djane Kotey Eric Tutu Tchao James Dzisi Gadze |
author_sort | Seth Djane Kotey |
collection | DOAJ |
description | Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attackers coordinate to launch an attack on one victim. Moreover, attackers these days do not need to be highly skilled to perpetrate an attack. Tools for orchestrating an attack can easily be found online and require little to no knowledge about attack scripts to initiate an attack. Studies have been done severally to develop defense mechanisms to detect and defend against DDoS attacks. As defense schemes are designed and developed, attackers are also on the move to evade these defense mechanisms and so there is a need for a continual study in developing defense mechanisms. This paper discusses the current DDoS defense mechanisms, their strengths and weaknesses. |
first_indexed | 2024-04-13T09:51:37Z |
format | Article |
id | doaj.art-19067879244049b8b9ca13bdddcc6cc2 |
institution | Directory Open Access Journal |
issn | 2227-7080 |
language | English |
last_indexed | 2024-04-13T09:51:37Z |
publishDate | 2019-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Technologies |
spelling | doaj.art-19067879244049b8b9ca13bdddcc6cc22022-12-22T02:51:34ZengMDPI AGTechnologies2227-70802019-01-01711910.3390/technologies7010019technologies7010019On Distributed Denial of Service Current Defense SchemesSeth Djane Kotey0Eric Tutu Tchao1James Dzisi Gadze2Department of Computer Engineering, Kwame Nkrumah University of Science and Technology (KNUST), PMB, Kumasi, GhanaDepartment of Computer Engineering, Kwame Nkrumah University of Science and Technology (KNUST), PMB, Kumasi, GhanaDepartment of Computer Engineering, Kwame Nkrumah University of Science and Technology (KNUST), PMB, Kumasi, GhanaDistributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attackers coordinate to launch an attack on one victim. Moreover, attackers these days do not need to be highly skilled to perpetrate an attack. Tools for orchestrating an attack can easily be found online and require little to no knowledge about attack scripts to initiate an attack. Studies have been done severally to develop defense mechanisms to detect and defend against DDoS attacks. As defense schemes are designed and developed, attackers are also on the move to evade these defense mechanisms and so there is a need for a continual study in developing defense mechanisms. This paper discusses the current DDoS defense mechanisms, their strengths and weaknesses.https://www.mdpi.com/2227-7080/7/1/19distributed denial of service (DDoS)detectiondefensetracebackattack |
spellingShingle | Seth Djane Kotey Eric Tutu Tchao James Dzisi Gadze On Distributed Denial of Service Current Defense Schemes Technologies distributed denial of service (DDoS) detection defense traceback attack |
title | On Distributed Denial of Service Current Defense Schemes |
title_full | On Distributed Denial of Service Current Defense Schemes |
title_fullStr | On Distributed Denial of Service Current Defense Schemes |
title_full_unstemmed | On Distributed Denial of Service Current Defense Schemes |
title_short | On Distributed Denial of Service Current Defense Schemes |
title_sort | on distributed denial of service current defense schemes |
topic | distributed denial of service (DDoS) detection defense traceback attack |
url | https://www.mdpi.com/2227-7080/7/1/19 |
work_keys_str_mv | AT sethdjanekotey ondistributeddenialofservicecurrentdefenseschemes AT erictututchao ondistributeddenialofservicecurrentdefenseschemes AT jamesdzisigadze ondistributeddenialofservicecurrentdefenseschemes |