Skip to main content

2018 | OriginalPaper | Buchkapitel

113. Techniques for Detecting, Preventing and Mitigating Distributed Denial of Service (DDoS) Attacks

verfasst von : Judith Clarisse Essome Epoh

Erschienen in: Information Technology - New Generations

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Even though Internet appears to be one of the successful phenomena of globalization today, web applications, services, and servers are being challenged by multiple vulnerabilities due to multiple penetrations. These security flaws can easily be exploited by malicious actors who will use malware to launch DDoS to damage critical infrastructures in small and large businesses putting their productivity and trust at risk. This paper offers methods that public and private sectors can consider to lessen damages cause by DDoS. The detective techniques will help uncover some early signs of malicious activities in the organization’s network. The preventive ones will ensure all methods have been implemented to stop the intrusion from happening. Findings have demonstrated that mitigation mechanism can only be effective with detective and preventive methods. It is vital to keep in mind that attackers are busy developing sophisticated tools to disrupt services and damage systems making traditional security tools ineffective. They need to be replaced by robust security technologies to protect networked systems efficiently as presented in this research. Security awareness as an important network security practice, will educate non-IT professionals, serve as a reminder to IT professionals and result in thwarting insider threats. When all these are successfully implemented, an attacker’s chances of launching a successful distributed denial-of-service attack are reduced by 2%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Beuchelt, G. (2013). Chapter 8. Securing web applications, services and servers. In J. Vacca (Ed.), Computer and information security handbook (2nd ed.). Boston: Morgan Kaufmann Publishers. Beuchelt, G. (2013). Chapter 8. Securing web applications, services and servers. In J. Vacca (Ed.), Computer and information security handbook (2nd ed.). Boston: Morgan Kaufmann Publishers.
2.
Zurück zum Zitat Day, C. (2013). Chapter 26. Intrusion detection and prevention systems. In J. Vacca (Ed.), Computer information security handbook. San Francisco: Morgan Kaufmann Publishers. Day, C. (2013). Chapter 26. Intrusion detection and prevention systems. In J. Vacca (Ed.), Computer information security handbook. San Francisco: Morgan Kaufmann Publishers.
3.
Zurück zum Zitat Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: Classification and state of the art. Computer Journal of Networks, 44(5), 643–666.CrossRef Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: Classification and state of the art. Computer Journal of Networks, 44(5), 643–666.CrossRef
4.
Zurück zum Zitat Gertz, M. (2011). Database security. In H. Bidgoli (Ed.), Handbook of information security, Volume 3. Database security mechanisms and models. New York: Wiley. Gertz, M. (2011). Database security. In H. Bidgoli (Ed.), Handbook of information security, Volume 3. Database security mechanisms and models. New York: Wiley.
5.
Zurück zum Zitat Gupta, B., Joshi, C., & Misra, M. (2010). Distributed denial of service prevention techniques. International Journal of Computer and Electrical Engineering, 2, 1793–8163. Gupta, B., Joshi, C., & Misra, M. (2010). Distributed denial of service prevention techniques. International Journal of Computer and Electrical Engineering, 2, 1793–8163.
11.
Zurück zum Zitat Shokri, R., Varshovi, A., H. Mohammadi, Yazdani, N., & Sadeghian, B. (2006, September 13–15). DDPM: Dynamic deterministic packet marking for IP traceback. IEEE International Conference on Networks (pp. 1–6). Singapore: IEEE. Shokri, R., Varshovi, A., H. Mohammadi, Yazdani, N., & Sadeghian, B. (2006, September 13–15). DDPM: Dynamic deterministic packet marking for IP traceback. IEEE International Conference on Networks (pp. 1–6). Singapore: IEEE.
Metadaten
Titel
Techniques for Detecting, Preventing and Mitigating Distributed Denial of Service (DDoS) Attacks
verfasst von
Judith Clarisse Essome Epoh
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-54978-1_113