DDoS Incidents and their Impact: A Review

The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. Now they are being progressively replaced by cheaper and more efficient Internet-based applications. In present era, the world is highly dependent on the Internet and it is considered as main infrastructure of the global information society . Therefore, the availability of Internet is very critical for the socio-economic growth of the society. However, the inherent vulnerabilities of the Internet architecture provide opportunities for a lot of attacks on its infrastructure and services. Distributed denial-of-service attack is one such kind of attack, which poses an immense threat to the availability of the Internet. One of the biggest challenges before researchers is to find details of these attacks because to avoid defamation most of the commercial sites do not even reveal that they were attacked. In this paper, an overview of distributed denial-of-service problem and Inherent vulnerabilities in the Internet architecture are provided. Real distributed denial-of-service incidents with their financial impact are critically analyzed and finally need for a comprehensive distributed denial-of-service solution is highlighted.

[1]  Songjie Wei,et al.  Benchmarks for DDOS Defense Evaluation , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[2]  John D. Howard,et al.  An analysis of security incidents on the Internet 1989-1995 , 1998 .

[3]  R. Hunt,et al.  TCP/IP security threats and attack methods , 1999, Comput. Commun..

[4]  Aikaterini Mitrokotsa,et al.  DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.

[5]  Jarmo V. E. Mölsä,et al.  Mitigating denial of service attacks in computer networks , 2006 .

[6]  Yuebin Bai,et al.  Intrusion Detection Systems: technology and development , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..

[7]  Jianyi Lin,et al.  Computer crime and security survey , 2002 .

[8]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[9]  Stefan Savage,et al.  Inferring Internet denial-of-service activity , 2001, TOCS.

[10]  Los Angeles,et al.  D-WARD: Source-End Defense Against Distributed Denial-of-Service Attacks , 2003 .

[11]  William Cheswick,et al.  Firewalls and Internet Security , 1994 .

[12]  George Kesidis,et al.  Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.

[13]  Rolf Oppliger,et al.  Internet security: firewalls and beyond , 1997, CACM.

[14]  Ramesh Chandra Joshi,et al.  Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain , 2007, Third International Symposium on Information Assurance and Security.

[15]  I. Monitor Information Security Management Handbook , 2000 .

[16]  R. Mateosian Firewalls and internet security: Repelling the wily hacker, 2nd ed. [Book Review] , 2003, IEEE Micro.

[17]  ChangR. K.C. Defending against flooding-based distributed denial-of-service attacks , 2002 .

[18]  Rocky K. C. Chang,et al.  Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..

[19]  R. C. Joshi,et al.  An Integrated Approach for Defending Against Distributed Denial-of-Service ( DDoS ) Attacks , 2022 .

[20]  Challenges and Principles of DDoS Defense paper , 2003 .

[21]  Lee Garber,et al.  Denial-of-Service Attacks Rip the Internet , 2000, Computer.

[22]  Patrick Horster,et al.  Cryptographic Protocols and Network Security , 1992, SEC.

[23]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[24]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[25]  Jung-Min Park,et al.  A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks , 2007, IEEE Transactions on Parallel and Distributed Systems.