Study of Network-Based DoS Attacks

The denial of service attack exploits the weakness in the TCP/IP implementation. In a privacy attack, the attacker tries to get access to the resources to which he is not authorized. The DoS attack blocks the authorized users from accessing the resources. The affected systems crash or disconnect from the Internet. In some cases, they are not much harmful. In other cases, they can be harmful, especially when you run a corporate network or ISP. This paper presents the denial of service attacks, and also the difference between DoS and DDoS is mentioned.

[1]  S. M. Bhaskar,et al.  Policy and Law: Denial of Service Threat , 2011 .

[2]  George M. Mohay,et al.  Detection and Mitigation of High-Rate Flooding Attacks , 2011 .

[3]  C. Pandu Rangan,et al.  Cryptographic Approaches to Denial-of-Service Resistance , 2011 .

[4]  David Starobinski,et al.  Protocol-Compliant DoS Attacks on CAN: Demonstration and Mitigation , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[5]  Raja Ettiane,et al.  Protection mechanisms for signaling DoS attacks on 3G mobile networks: Comparative study and future perspectives , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).

[6]  Izzat Alsmadi,et al.  Identifying DoS attacks on software defined networks: A relation context approach , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[7]  Bülent Sankur,et al.  Detection of (D)DOS attacks based on online change point analysis , 2016, 2016 24th Signal Processing and Communication Application Conference (SIU).