On Distributed Denial of Service Current Defense Schemes

Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attacke...

Full description

Bibliographic Details
Main Authors: Seth Djane Kotey, Eric Tutu Tchao, James Dzisi Gadze
Format: Article
Language:English
Published: MDPI AG 2019-01-01
Series:Technologies
Subjects:
Online Access:https://www.mdpi.com/2227-7080/7/1/19
_version_ 1811310033099554816
author Seth Djane Kotey
Eric Tutu Tchao
James Dzisi Gadze
author_facet Seth Djane Kotey
Eric Tutu Tchao
James Dzisi Gadze
author_sort Seth Djane Kotey
collection DOAJ
description Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attackers coordinate to launch an attack on one victim. Moreover, attackers these days do not need to be highly skilled to perpetrate an attack. Tools for orchestrating an attack can easily be found online and require little to no knowledge about attack scripts to initiate an attack. Studies have been done severally to develop defense mechanisms to detect and defend against DDoS attacks. As defense schemes are designed and developed, attackers are also on the move to evade these defense mechanisms and so there is a need for a continual study in developing defense mechanisms. This paper discusses the current DDoS defense mechanisms, their strengths and weaknesses.
first_indexed 2024-04-13T09:51:37Z
format Article
id doaj.art-19067879244049b8b9ca13bdddcc6cc2
institution Directory Open Access Journal
issn 2227-7080
language English
last_indexed 2024-04-13T09:51:37Z
publishDate 2019-01-01
publisher MDPI AG
record_format Article
series Technologies
spelling doaj.art-19067879244049b8b9ca13bdddcc6cc22022-12-22T02:51:34ZengMDPI AGTechnologies2227-70802019-01-01711910.3390/technologies7010019technologies7010019On Distributed Denial of Service Current Defense SchemesSeth Djane Kotey0Eric Tutu Tchao1James Dzisi Gadze2Department of Computer Engineering, Kwame Nkrumah University of Science and Technology (KNUST), PMB, Kumasi, GhanaDepartment of Computer Engineering, Kwame Nkrumah University of Science and Technology (KNUST), PMB, Kumasi, GhanaDepartment of Computer Engineering, Kwame Nkrumah University of Science and Technology (KNUST), PMB, Kumasi, GhanaDistributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attackers coordinate to launch an attack on one victim. Moreover, attackers these days do not need to be highly skilled to perpetrate an attack. Tools for orchestrating an attack can easily be found online and require little to no knowledge about attack scripts to initiate an attack. Studies have been done severally to develop defense mechanisms to detect and defend against DDoS attacks. As defense schemes are designed and developed, attackers are also on the move to evade these defense mechanisms and so there is a need for a continual study in developing defense mechanisms. This paper discusses the current DDoS defense mechanisms, their strengths and weaknesses.https://www.mdpi.com/2227-7080/7/1/19distributed denial of service (DDoS)detectiondefensetracebackattack
spellingShingle Seth Djane Kotey
Eric Tutu Tchao
James Dzisi Gadze
On Distributed Denial of Service Current Defense Schemes
Technologies
distributed denial of service (DDoS)
detection
defense
traceback
attack
title On Distributed Denial of Service Current Defense Schemes
title_full On Distributed Denial of Service Current Defense Schemes
title_fullStr On Distributed Denial of Service Current Defense Schemes
title_full_unstemmed On Distributed Denial of Service Current Defense Schemes
title_short On Distributed Denial of Service Current Defense Schemes
title_sort on distributed denial of service current defense schemes
topic distributed denial of service (DDoS)
detection
defense
traceback
attack
url https://www.mdpi.com/2227-7080/7/1/19
work_keys_str_mv AT sethdjanekotey ondistributeddenialofservicecurrentdefenseschemes
AT erictututchao ondistributeddenialofservicecurrentdefenseschemes
AT jamesdzisigadze ondistributeddenialofservicecurrentdefenseschemes