Skip to main content
Top

2022 | OriginalPaper | Chapter

Implementation of Efficient Technique to Conduct DDoS Attack Using Client–Server Paradigm

Authors : Seema Rani, Ritu Nagpal

Published in: IoT and Analytics for Sensor Networks

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In modern times, every human being relies upon the internet for fulfilling their hefty needs as the internet offers a vast amount of information to users, so its availability to users is indispensable. Major objectives of security are availability, integrity, and confidentiality. DDoS (Distributed Denial of Service) is a universal cyber-attack that is a major intimidation for cyberspace. DDoS attack slows down network availability by overflowing illegal traffic over network bandwidth. Day by day, attackers improve upon their strategies by using new technologies and techniques. In this paper, a DDoS attack is proposed using python script. We focus on the volumetric DDoS attack effect on the performance of the server ultimately shutting it down. A DDoS attack is undertaken using a python script on the server in which multiple clients send multiple fake requests to the server to slow down the services/performance of the server.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chowdhury, A. (2016). In L. Batten & G. Li (Eds.), Applications and techniques in information security (Vol. 651, pp. 54–65). Chowdhury, A. (2016). In L. Batten & G. Li (Eds.), Applications and techniques in information security (Vol. 651, pp. 54–65).
2.
go back to reference Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39.CrossRef Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39.CrossRef
3.
go back to reference Purwanto, Y., Kuspriyanto, Hendrawan, & Rahardjo, B. (2014). Traffic anomaly detection in DDoS flooding attack. In 8th International Conference on Telecommunication Systems Services and Applications (pp. 1–6). Kuta, Bali, Indonesia: IEEE. Purwanto, Y., Kuspriyanto, Hendrawan, & Rahardjo, B. (2014). Traffic anomaly detection in DDoS flooding attack. In 8th International Conference on Telecommunication Systems Services and Applications (pp. 1–6). Kuta, Bali, Indonesia: IEEE.
4.
go back to reference Sachdeva, M., Kumar, K., Singh, G., & Singh, K. (2009). Performance analysis of web service under DDoS attacks. In IEEE International Advance Computing Conference (pp. 1002–1007). Patiala, India: IEEE. Sachdeva, M., Kumar, K., Singh, G., & Singh, K. (2009). Performance analysis of web service under DDoS attacks. In IEEE International Advance Computing Conference (pp. 1002–1007). Patiala, India: IEEE.
5.
go back to reference Li, J., Liu, M., Xue, Z., Fan, X., & He, X. (2020). RTVD: A real-time volumetric detection scheme for DDoS in the internet of things. IEEE Access, 8, 36191–36201.CrossRef Li, J., Liu, M., Xue, Z., Fan, X., & He, X. (2020). RTVD: A real-time volumetric detection scheme for DDoS in the internet of things. IEEE Access, 8, 36191–36201.CrossRef
6.
go back to reference Yihunie, F., Abdelfattah, E., & Odeh, A. (2018). Analysis of ping of death DoS and DDoS attacks. In IEEE Long Island Systems, Applications and Technology Conference (pp 1–4). Farmingdale, NY: IEEE. Yihunie, F., Abdelfattah, E., & Odeh, A. (2018). Analysis of ping of death DoS and DDoS attacks. In IEEE Long Island Systems, Applications and Technology Conference (pp 1–4). Farmingdale, NY: IEEE.
7.
go back to reference Jamshed, M., & Brustoloni, J. (2010). In-network server-directed client authentication and packet classification. In IEEE Local Computer Network Conference (pp. 328–331). Denver, CO, USA: IEEE. Jamshed, M., & Brustoloni, J. (2010). In-network server-directed client authentication and packet classification. In IEEE Local Computer Network Conference (pp. 328–331). Denver, CO, USA: IEEE.
8.
go back to reference Guleria, A., Kalra, E., & Gupta, K. (2019). Detection and prevention of DoS attacks on network systems. In International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (pp. 544–548). Faridabad, India: IEEE. Guleria, A., Kalra, E., & Gupta, K. (2019). Detection and prevention of DoS attacks on network systems. In International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (pp. 544–548). Faridabad, India: IEEE.
9.
go back to reference Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., & Kushwaha, D. S. (2012). In N. Meghanathan, D. Nagamalai, & N. Chaki (Eds.), Advances in computing and information technology (Vol. 176, pp. 719–728). Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., & Kushwaha, D. S. (2012). In N. Meghanathan, D. Nagamalai, & N. Chaki (Eds.), Advances in computing and information technology (Vol. 176, pp. 719–728).
10.
go back to reference Tupakula, U. K., & Varadharajan, V. (2003). Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture. In The 11th IEEE International Conference on Networks (pp 455–460). Sydney, Australia: IEEE. Tupakula, U. K., & Varadharajan, V. (2003). Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture. In The 11th IEEE International Conference on Networks (pp 455–460). Sydney, Australia: IEEE.
11.
go back to reference Kumar, K., Joshi, R. C., & Singh, K. (2007). In T. Sobh, K. Elleithy, A. Mahmood, & M. Karim (Eds.), Innovative algorithms and techniques in automation, industrial electronics and telecommunications (pp. 235–240). Kumar, K., Joshi, R. C., & Singh, K. (2007). In T. Sobh, K. Elleithy, A. Mahmood, & M. Karim (Eds.), Innovative algorithms and techniques in automation, industrial electronics and telecommunications (pp. 235–240).
13.
go back to reference Choi, J., Choi, C., Ko, B., & Kim, P. (2014). A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Computing, 18(9), 1697–1703.CrossRef Choi, J., Choi, C., Ko, B., & Kim, P. (2014). A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Computing, 18(9), 1697–1703.CrossRef
14.
go back to reference Zhijun, W., Wenjing, L., Liang, L., & Meng, Y. (2020). Low-rate DoS attacks, detection, defense, and challenges: A survey. IEEE Access, 8, 43920–43943.CrossRef Zhijun, W., Wenjing, L., Liang, L., & Meng, Y. (2020). Low-rate DoS attacks, detection, defense, and challenges: A survey. IEEE Access, 8, 43920–43943.CrossRef
15.
go back to reference Carl, G., Kesidis, G., Brooks, R. R., & Rai, S. (2006). Denial-of-service attack-detection techniques. IEEE Internet Computing, 10(1), 82–89.CrossRef Carl, G., Kesidis, G., Brooks, R. R., & Rai, S. (2006). Denial-of-service attack-detection techniques. IEEE Internet Computing, 10(1), 82–89.CrossRef
16.
go back to reference Tan, L., Pan, Y., Wu, J., Zhou, J., Jiang, H., & Deng, Y. (2020). A new framework for DDoS attack detection and defense in SDN environment. IEEE Access, 8, 161908–161919.CrossRef Tan, L., Pan, Y., Wu, J., Zhou, J., Jiang, H., & Deng, Y. (2020). A new framework for DDoS attack detection and defense in SDN environment. IEEE Access, 8, 161908–161919.CrossRef
17.
go back to reference Raj, A. G. R., Sunitha, R., & Prasad, H. B. (2020). Mitigating DDoS flooding attacks with dynamic path identifiers in wireless network. In Second International Conference on Inventive Research in Computing Applications Coimbatore (pp. 869–874). Coimbatore, India: IEEE. Raj, A. G. R., Sunitha, R., & Prasad, H. B. (2020). Mitigating DDoS flooding attacks with dynamic path identifiers in wireless network. In Second International Conference on Inventive Research in Computing Applications Coimbatore (pp. 869–874). Coimbatore, India: IEEE.
18.
go back to reference Agrawal, N., & Tapaswi, S. (2019). Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 21(4), 3769–3795.CrossRef Agrawal, N., & Tapaswi, S. (2019). Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 21(4), 3769–3795.CrossRef
19.
go back to reference Munshi, A., Alqarni, N. A., & Abdullah Almalki, N. (2020). DDoS attack on IOT devices. In 2020 3rd International Conference on Computer Applications & Information Security (pp. 1–5). Riyadh, Saudi Arabia: IEEE. Munshi, A., Alqarni, N. A., & Abdullah Almalki, N. (2020). DDoS attack on IOT devices. In 2020 3rd International Conference on Computer Applications & Information Security (pp. 1–5). Riyadh, Saudi Arabia: IEEE.
20.
go back to reference Udhayan, J., Hamsapriya, T., & Vasanthi, N. A. (2012). DDoS attack detection through flow analysis and traffic modeling. In V. V. Das, E. Ariwa, & S. B. Rahayu (Eds.), Signal processing and information technology (Vol. 62, pp. 89–94). Udhayan, J., Hamsapriya, T., & Vasanthi, N. A. (2012). DDoS attack detection through flow analysis and traffic modeling. In V. V. Das, E. Ariwa, & S. B. Rahayu (Eds.), Signal processing and information technology (Vol. 62, pp. 89–94).
21.
go back to reference Salim, M. M., Rathore, S., & Park, J. H. (2020). Distributed denial of service attacks and its defenses in IoT: A survey. The Journal of Supercomputing, 76(7), 5320–5363.CrossRef Salim, M. M., Rathore, S., & Park, J. H. (2020). Distributed denial of service attacks and its defenses in IoT: A survey. The Journal of Supercomputing, 76(7), 5320–5363.CrossRef
22.
go back to reference Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys & Tutorials, 16(1), 303–336.CrossRef Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys & Tutorials, 16(1), 303–336.CrossRef
Metadata
Title
Implementation of Efficient Technique to Conduct DDoS Attack Using Client–Server Paradigm
Authors
Seema Rani
Ritu Nagpal
Copyright Year
2022
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-2919-8_42