Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

Different types and techniques of DDoS attacks & defense are studied in this paper with some recent information on attacks dominated in year 2012 (1st Quarter). We further provide simulation based analysis of an FTP server"s performance in a typical enterprise network under distributed denial of service attack. Simulations in OPNET show noticeable variations in connection capacity, task processing and delay parameters of the attacked server as compared to the performance without attack. DDoS detection and mitigation mechanisms discussed in this paper mainly focus on some recently investigated techniques. Finally, conclusions are drawn on the basis of survey based study as well as simulation results.

[1]  Wanlei Zhou,et al.  Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics , 2009, 2009 Third International Conference on Network and System Security.

[2]  Muhammad Aamir,et al.  Performance Analysis of DiffServ based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET , 2012, ArXiv.

[3]  Brij B. Gupta,et al.  Predicting Number of Zombies in a DDoS Attack Using ANN Based Scheme , 2011 .

[4]  John Langford,et al.  Telling humans and computers apart automatically , 2004, CACM.

[5]  Jian Yuan,et al.  Monitoring the macroscopic effect of DDoS flooding attacks , 2005, IEEE Transactions on Dependable and Secure Computing.

[6]  Urbashi Mitra,et al.  Parametric Methods for Anomaly Detection in Aggregate Traffic , 2011, IEEE/ACM Transactions on Networking.

[7]  Gurjinder Kaur,et al.  Distributed Denial of Service Attacks in Mobile Adhoc Networks , 2011 .

[8]  Vijay Varadharajan,et al.  Counteracting DDoS attacks in WLAN , 2011, SIN '11.

[9]  Wanlei Zhou,et al.  Distributed Denial of Service (DDoS) detection by traffic pattern analysis , 2014, Peer-to-Peer Netw. Appl..

[10]  Jun Bi,et al.  An adaptive probabilistic marking scheme for fast and secure traceback , 2013 .

[11]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[12]  Sanjeev Khanna,et al.  Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks , 2012, IEEE/ACM Transactions on Networking.

[13]  Shunzheng Yu,et al.  Monitoring the Application-Layer DDoS Attacks for Popular Websites , 2009, IEEE/ACM Transactions on Networking.

[14]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[15]  Jin Li,et al.  DDoS attack detection based on neural network , 2010, 2010 2nd International Symposium on Aware Computing.

[16]  Zhang Chao-yang DOS Attack Analysis and Study of New Measures to Prevent , 2011, 2011 International Conference on Intelligence Science and Information Engineering.

[17]  Aikaterini Mitrokotsa,et al.  Denial‐of‐Service Attacks , 2007 .

[18]  Amir Herzberg,et al.  LOT: A Defense Against IP Spoofing and Flooding Attacks , 2012, TSEC.

[19]  Di Wu,et al.  A Survey on Latest Botnet Attack and Defense , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[20]  Geert Deconinck,et al.  Denial of Service Attacks: a Tutorial , 2011 .

[21]  Brij B. Gupta,et al.  Estimating Strength of a DDoS Attack in Real Time Using ANN Based Scheme , 2011 .