A comprehensive categorization of DDoS attack and DDoS defense techniques

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

29 Scopus citations

Abstract

Distributed Denial of Service (DDoS) attack is the greatest security fear for IT managers. With in no time, thousands of vulnerable computers can flood victim website by choking legitimate traffic. Several specific security measurements are deployed to encounter DDoS problem. Instead of specific solution, a comprehensive DDoS cure is needed which can combat against the previously and upcoming DDoS attack vulnerabilities. Development of such solution requires understanding of all those aspects which can help hacker to activate zombies and launch DDoS attack. In this paper, we comprehensively analyzed the DDoS problem and we proposed a simplified taxonomy to categorize the attack scope and available defense solutions. This taxonomy can help the software developers and security practitioners to understand the common vulnerabilities that encourage the attackers to launch DDoS attack.

Original languageEnglish
Title of host publicationAdvanced Data Mining and Applications - Second International Conference, ADMA 2006, Proceedings
EditorsXue Li, Osmar R. Zaïane, Zhanhuai Li
PublisherSpringer Verlag
Pages1025-1036
Number of pages12
ISBN (Print)3540370250, 9783540370253
DOIs
StatePublished - 2006
Externally publishedYes
Event2nd International Conference on Advanced Data Mining and Applications, ADMA 2006 - Xi'an, China
Duration: 14 Aug 200616 Aug 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4093 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Advanced Data Mining and Applications, ADMA 2006
Country/TerritoryChina
CityXi'an
Period14/08/0616/08/06

Fingerprint

Dive into the research topics of 'A comprehensive categorization of DDoS attack and DDoS defense techniques'. Together they form a unique fingerprint.

Cite this