Research Article Open Access

Flooding Distributed Denial of Service Attacks-A Review

Khadijah Wan Mohd Ghazali1 and Rosilah Hassan2
  • 1 , Afganistan
  • 2 ,
Journal of Computer Science
Volume 7 No. 8, 2011, 1218-1223

DOI: https://doi.org/10.3844/jcssp.2011.1218.1223

Submitted On: 23 November 2010 Published On: 15 July 2011

How to Cite: Ghazali, K. W. M. & Hassan, R. (2011). Flooding Distributed Denial of Service Attacks-A Review. Journal of Computer Science, 7(8), 1218-1223. https://doi.org/10.3844/jcssp.2011.1218.1223

Abstract

Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  • 1,151 Views
  • 2,210 Downloads
  • 7 Citations

Download

Keywords

  • Denial of service
  • high-rate flood
  • low-rate flood
  • Distributed Denial of Service (DDoS)
  • flood attacks
  • International Telecommunication Union's (ITU)
  • Time-Out (RTO)
  • Active Queue Management (AQM)
  • UDP flood attack