Survey on Recent DDoS Mitigation Techniques and Comparative Analysis

被引:5
|
作者
Rai, Ankur [1 ]
Challa, Rama Krishna [1 ]
机构
[1] NITTTR Chandigarh, Dept Comp Sci & Engn, Chandigarh, India
关键词
DDoS; Mitigation techniques; application domain; comparative analysis;
D O I
10.1109/CICT.2016.27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Customers trust is the most important factor for an organization success. This trust only builds if customers receive unhindered services from their vendors. A major threat in successfully building a customer-vendor trust relationship exists in the form of Distributed Denial of Service attacks. These attacks have become more evasive and complex with time such that existing security mechanisms are not sufficient to counter them. A lot of techniques are already proposed by various researchers to counter these attacks which have their own application domain, advantages and disadvantages. In this paper we present an extensive survey of recent DDoS mitigation techniques along with their comparative analysis.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 50 条
  • [31] A Survey: Network Attack Detection and Mitigation Techniques
    Shinde, Om
    Kulkarni, Varad
    Patani, Harsh
    Rajput, Anagha
    Jaiswal, R. C.
    SMART TRENDS IN COMPUTING AND COMMUNICATIONS, VOL 1, SMARTCOM 2024, 2024, 945 : 263 - 275
  • [32] 9-1-1 DDoS: Attacks, Analysis and Mitigation
    Guri, Mordechai
    Mirsky, Yisroel
    Elovici, Yuval
    2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 218 - 232
  • [33] Scalable DDoS Mitigation System
    Blazek, Petr
    Gerlich, Tomas
    Martinasek, Zdenek
    2019 42ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2019, : 617 - 620
  • [34] Detection and mitigation of DDoS in SDN
    Pande, Bhavika
    Bhagat, Gargi
    Priya, Shanu
    Agrawal, Himanshu
    2018 ELEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2018, : 371 - 373
  • [35] Survey and comparative analysis of entropy and relative entropy thresholding techniques
    Chang, C. I.
    Du, Y.
    Wang, J.
    Guo, S. -M.
    Thouin, P. D.
    IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2006, 153 (06): : 837 - 850
  • [36] A Comprehensive Review of Distributed Denial-of-Service (DDoS) Attacks: Techniques and Mitigation Strategies
    Alomari, Mariam
    Alsadah, Sharifa
    Aldahmash, Noura
    Alghulaygah, Hana
    Alogaiel, Razan
    Saqib, Nazar Abbas
    PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 215 - 222
  • [37] A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks
    Jain, Ankit Kumar
    Shukla, Hariom
    Goel, Diksha
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09): : 13129 - 13164
  • [38] Machine Learning Techniques to Detect DDoS Attacks on VANET System: A Survey
    Alrehan, Alia Mohammed
    Al-Haidari, Fahd
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [39] DDoS SourceTracer: An Intelligent Application for DDoS Attack Mitigation in SDN
    Aslam, Naziya
    Srivastava, Shashank
    Gore, M. M.
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 117
  • [40] Attacks on Recent DNN IP Protection Techniques and Their Mitigation
    Mukherjee, Rijoy
    Chakraborty, Rajat Subhra
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (11) : 3642 - 3650