Detection techniques of DDoS attacks: A survey

Security is the main confront of internet, Distributed Denial of Service (DDoS) is the major cause of threat. DDoS reduces the network resources, and results in bandwidth depletion. The main aim of DDoS is to prevent legitimate users from assessing the services. There also exists a difficulty to differentiate between flash crowd and DDoS attack traffic. The various existing solutions which are given in order to detect DDoS has been discussed in this paper. The goal of the paper is to review how the different methods are helping in downsizing the effect of DDoS and also how that are being used to detect a DDoS attack.

[1]  Shui Yu,et al.  CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[2]  Virendra Kumar Yadav,et al.  Hiding large amount of data using a new approach of video steganography , 2013 .

[3]  Setiadi Yazid,et al.  DDoS Attack detection method and mitigation using pattern of the flow , 2013, 2013 International Conference of Information and Communication Technology (ICoICT).

[4]  Shui Yu,et al.  DDoS Attack Detection at Local Area Networks Using Information Theoretical Metrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[5]  Sujatha Sivabalan,et al.  A novel framework to detect and block DDoS attack at the application layer , 2013, IEEE 2013 Tencon - Spring.

[6]  Dongqi Wang,et al.  A multi-core based DDoS detection method , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[7]  Munesh Chandra Trivedi,et al.  DDA: An Approach to Handle DDoS (Ping Flood) Attack , 2016 .

[8]  Virendra Kumar Yadav,et al.  A Novel Approach of Bulk Data Hiding using Text Steganography , 2015 .

[9]  Saumya Batham,et al.  A New Video Encryption Algorithm Based on Indexed Based Chaotic Sequence , 2013 .

[10]  A. L. Sangal,et al.  Traceback techniques against DDOS attacks: A comprehensive review , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).