DDoS Defense Mechanisms: A New Taxonomy
Internet scale DoS attack is a new evolution of conventional flooding DoS attack with the inspiration of shutting down the Internet due to its vulnerable infrastructure. Past DoS attacks directly attacked the victim, usually a single host. Consequently, defences were designed to identify the excessive traffic or filter illegitimate traffic. From the early two thousand, Internet scale DoS attacks started to appear. They aimed to disable highly connected routers or large links with a legitimate action in the form of low-rate traffic or high-rate wanted traffic with protocol messages that are unfiltered by congestion control.
Skip to search form Skip to main content. In this article, we present an in-depth study of the denial of service problem in the Internet, and provide a comprehensive survey of attacks and their countermeasures. We investigate various DoS attack mechanisms, derive a more practical taxonomy of attack mechanisms, and summarize the challenges in DoS defense. View PDF. Save to Library. Create Alert.
Internet Denial of Service: Attack and Defense Mechanisms
In this book, the authors shed light on a form of computer attack that impacts the confidentiality, integrity, and availability of computers worldwide. Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a distributed denial-of-service DDoS attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate chief technical officer, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses.