DOI QR코드

DOI QR Code

A Study on Recent Approaches in Managing and Detection of DDoS Attacks

  • A. Anthony Paul Raj (Periyar University) ;
  • J. K. Kani Mozhi (Dept. of Computer Application, Sengunthar Arts and Science College )
  • Received : 2024.10.05
  • Published : 2024.10.30

Abstract

In a system we use to share the data over the around the world. While sharing the data is to keep up the information confidentially. Attacker in the system may capture this privately data or distorted. So security is the principle piece of concern. There are a few security attacks in system. A standout among the most critical and modern day dangers is DDoS (Distributed disavowal of administrations) attacks. It gives an opportunity to an attacker to expand access to a huge number of computers by use their vulnerabilities to set up attacks systems or Botnets. The fundamental thought of this paper is to concentrate on modern day approaches managing and Detection of DDoS attacks

Keywords

Acknowledgement

Foremost, my gratitude goes to Dr. J. K. Kani Mozhi, Professor, Department of Computer Application, Sengunthar Arts & Science College, Tiruchengode, who guided me into the fractal realm. Her vision, her enthusiasm and her spirit inspired and enlightened me to carry out this research paper with curiosity and involvement. And I thank my wife Mrs. A. Arockia Vinnarasi my son Master A. Joel Roy and my little angel A. Jessica Mariam who always supported to me. Finally, I thank God who gives me good health, continuous encouragement and support throughout the research work and my life.

References

  1. Santhosh Kumar Karre, "Distributed Detection of DDoS Attack,"International Journal of Future Computer and Communication, Vol. 2, No. 6, December 2013.
  2. http://www.zdnet.com/article/ddosattacksincreaseover125percentyearoveryear/.
  3. https://securelist.com/analysis/quarterlymalwarereports/74550/kasperskyddosintelligencereportforq12016/ 
  4. Divya Kuriakose, V.Praveena "Survey on DDoS Attacks and Defense Approaches "International Journal of Innovative Research in Computer and Communication Engineering,Vol. 1, Issue 8, October 2013. 
  5. F. Lau, S. H. Rubin, M. H. Smith and L. Trajkovic, "Distributed Denial of Service Attacks" IEEE International Conference on Systems, Man, and Cybernetics, Nashville, 8-11 October 2000, pp. 2275- 2280. 
  6. T. M. Wu, "Intrusion Detection Systems ", Information Assurance Technology Analysis Centre (IATAC), September 2009.
  7. F. Dressler, G. Munz, G. Carle, "Attack detection using cooperating autonomous detection system(CATS),"Wilhelm-Schickard Institute of Computer Science, Computer Networks and Internet, 2004. 
  8. P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, E. Vazquez, "Anomaly-based network intrusion detection:Techniques, systems and challenges," computers &security, vol.28, pp. 18-28, 2009. 
  9. DDoS Attack Detection & Mitigation in SDN FINAL VIVA PRESENTATION 2014-12-08 COMSE-6998 Presented by Chao CHEN (cc3736). 
  10. http://zaielacademic.net/security/syn_attacks.htm
  11. A. Akella, , Bharambe, M. Reiter, M., and Seshan, S"Detecting DDoS attacks on ISP networks."Proceedings of the Workshop on Management andProcessing of Data Streams, San Diego, CA, 8 June, pp. 1-2. ACM. . (2003). 
  12. K Munivara Prasad, Dr. A Rama Mohan Reddy, Modelling and Counter measures of Flooding attacks to ITM using Botnet and Group Testing, Global journal of Computer Science and Technology (GJCST), Volume 11, Issue 21,pp-15- 24, Dec 2011,
  13. C.L. Chen "A new detection method for distributed denial-of-service attack traffic based on statistical test",. Journal of Universal Computer Science, 15, 488-504. ,(2009). 
  14. Bayu Adhi Tama, Kyung-Hyune Rhee," Data Mining echniques in DoS/DDoS Attack Detection: A Literature Review," The 3rd International Conference on Computer Applications and Information Processing Technology (CAIPT 2015), Yangon, Myanmar, June 23-24, 2015. 
  15. Suchita Korad, Shubhada Kadam, Prajakta Deore3, Madhuri Jadhav, Prof.Rahul Patil, "Detection of Distributed Denial of ServiceAttack with Hadoop on Live Network",International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 1, January 2016 
  16. Niharika Sharma, Amit Mahajan, Vibhakar Mansotra, " Machine Learning Techniques Used in Detection of DOS Attacks: A Literature Review " International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 3, March 2016 
  17. Mangesh D. Salunke ,Prof. Ruhi Kabra,‟ Denial-of-Service Attack Detection „International Journal of Innovative Research in Advanced Engineering (IJIRAE) „,Volume 1 Issue 11 (November 2014) 
  18. Mangesh Salunke, Ruhi Kabra, Ashish Kumar.‟ Layered architecture for DoS attack detection system by combine approach of Naive bayes and Improved K-means Clustering Algorithm‟, International Research Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 03 ,June-2015.