Detecting, Preventing or Mitigating Distributed Dos (DDOS) Attacks
The Internet continues to be a critical subject due to the increasing attacks based on the major universal communication infrastructures. This study identifies the one detection and two mitigation approaches in developing content to show that DDoS are becoming common in daily business operations.
Rationale for selecting the papers
The first research paper I selected is titled "Mitigating Dos Attacks Using Performance Model-Driven Adaptive Algorithms" by Barna and others. The article is recent and goes in length in elucidating the most invaluable method of mitigating DDoS. I also selected this article because it goes in lengths showing how DDoS affects the operations of an organization warranting the adoption of succinct measures in case of an attack.
I also selected an article by Rahmani, Sahli, and Kamoun, titled "Distributed Denial-Of-Service Attack Detection Scheme-Based Joint-Entropy" as it elucidates clearly the best way of detecting DDoS in an organization's IT systems. Besides showing the threats posed by DDoS, the article confirms that Scheme-Based Joint-Entropy detects the attacks accurately.
The third article by Tripathi, et al. (2013) titled "Hadoop-Based Defense Solution To Handle Distributed Denial Of Service (DDoS)" shows how the MapReduce programming model can be used with other techniques to mitigate DDoS attacks. The article show shows how attackers often evolve and come up with new attack techniques warranting the adopting of diverse mitigation measures.
Background
For purposes of reducing false positive rates, many parameters have been used in providing accurate normal profiles and increasing the computational overheads to mitigate DDoS attacks. Hybrid attack mitigation has optimistic features of the pattern and anomaly-based models. The approaches achieve the scope of low false negatives and positives, high detection accuracy, and increment in cyber conviction levels. Although the hybrid attack mitigation approaches decrease false positive rates, they increase the cost and complexity of implementation. Third party involvement brings on board mechanisms deployed within third-party detection without handling the detection process and relying on external third parties that signal the occurrence of attacks (Carl, Kesidis, Brooks, & Rai, 2006).
Distributed Denial of Service attacks consuming the resources of target machines and the victim's ability to use web services efficiently. Besides, the attacks cause serious problems to Internet societies and users. DoS attacks become distributed and large-scale when attempts are coordinated to exhaust network capabilities by making enormous requests that overload the machine of the victim. The machine becomes incapacitated to provide services to the legitimate user while the network performances are deteriorated.
The change-point detectors treat legitimate flash crowds in terms of DDoS attacks since they may be classified as occurrences of false positives. The peaks report attacks even though they encounter network issues or the Internet Control Message Protocol aspects or legitimate peaks that have shorter durations. The element of the purchase has more of the proposed works and mechanism monitoring that takes into consideration the useful connections. This scope includes the active training and testing periods. The mechanism enables users to have better precision for calculated joint-entropy values and reduce the risks of false positives.
First Detection Strategy
One of the commonly identified attacks includes "Denial of Service." The tool includes highly damageable attacks that degrade network's quality in terms of service as well as other hard-to-predict ways. Detection deliverables of distributed denial-of-service include the scope of information distance detector, change-point detection, wavelet analysis, and activity profiling. The change-point detection method is based on features of specific the DDoS attacks. However, it remains highly accessible to external hackers who mimic the features to fool user's detection approach (Rahmani, Sahli & Kamoun, 2012). The open architecture of the Internet allows hackers to spoof sources of IP addresses due to the attack packets and the real IP addresses and their distribution while acting against source address algorithms for distribution-based detection.
Hackers change logic value of the transistor -- transistor relationship and the attack packets based on the real distances between victims and zombies for purposes of countering hop-count methods of detection. These events become hard to detect in real time through observing traffic. The relationship becomes harder in case observed networks carry larger traffic amounts while drowning the malicious ones. For this reason, the approach of exposing and accurately detecting malicious traffic is a detectable problem.
In flying the radar, attackers may mimic the flash crowds' behaviors for the sudden increment of legitimate traffic. For instance, most fans access official websites while important matches are ongoing. Many people check on the CNN website during the 'breaking news' segment. DDoS...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now