Distributed Denial of Service (DDoS): A History

被引:9
|
作者
Brooks, Richard R. [1 ]
Yu, Lu [1 ]
Ozcelik, Ilker [2 ]
Oakley, Jon [3 ]
Tusing, Nathan [4 ]
机构
[1] Clemson Univ, Holcombe Dept Elect & Comp Engn, Clemson, SC 29634 USA
[2] Recep Tayyip Erdogan Univ, Dept Comp Engn, TR-53100 Merkez Rize, Turkey
[3] Clemson Univ, Clemson, SC 29634 USA
[4] Clemson Univ, Holcombe Dept Elect & Comp Engn, Comp Engn, Clemson, SC 29634 USA
基金
美国国家科学基金会;
关键词
Denial-of-service attack;
D O I
10.1109/MAHC.2021.3072582
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early Internet, DDoS attacks have persisted. This article presents the technologies and tools that are used in DDoS, followed by a timeline of the major DDoS incidents. This is followed by a discussion of the primary classes of DDoS incidents and how the computing ecosystem enables DDoS. Early attacks were related to hacker culture, but their focus quickly changed to commercial exploitation. There have also been a number of political uses of DDoS, including cyberwar, hacktivism, and terrorism.
引用
收藏
页码:44 / 54
页数:11
相关论文
共 50 条
  • [1] RateGuard: A Robust Distributed Denial of Service (DDoS) Defense System
    Sun, Huizhong
    Ngan, Wingchiu
    Chao, H. Jonathan
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 2033 - 2040
  • [2] AI in the Detection and Prevention of Distributed Denial of Service (DDoS) Attacks
    Ahmadi, Sina
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (10) : 23 - 29
  • [3] Distributed Denial of Service (DDoS) detection by traffic pattern analysis
    Theerasak Thapngam
    Shui Yu
    Wanlei Zhou
    S. Kami Makki
    Peer-to-Peer Networking and Applications, 2014, 7 : 346 - 358
  • [4] Distributed Denial of Service (DDoS) detection by traffic pattern analysis
    Thapngam, Theerasak
    Yu, Shui
    Zhou, Wanlei
    Makki, S. Kami
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 346 - 358
  • [5] Deep learning model for distributed denial of service (DDoS) detection
    Tennakoon, Chaminda
    Fernando, Subha
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2022, 9 (02): : 109 - 118
  • [6] Protecting against distributed denial of service (DDoS) attacks using distributed filtering
    Trostle, Jonathan
    2006 SECURECOMM AND WORKSHOPS, 2006, : 201 - 211
  • [7] The Distributed Denial of Service Attacks (DDoS) Prevention Mechanisms on Application Layer
    Bhosale, Karuna S.
    Nenova, Maria
    Iliev, Georgi
    2017 13TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SYSTEMS AND SERVICES IN TELECOMMUNICATIONS (TELSIKS), 2017, : 136 - 139
  • [8] Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy
    Karnani, Suruchi
    Shakya, Harish Kumar
    INFORMATION SECURITY JOURNAL, 2023, 32 (06): : 444 - 468
  • [9] Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy
    Sharafaldin, Iman
    Lashkari, Arash Habibi
    Hakak, Saqib
    Ghorbani, Ali A.
    2019 IEEE 53RD INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST 2019), 2019,
  • [10] DDoS-AT-2022: a distributed denial of service attack dataset for evaluating DDoS defense system
    Meenakshi Mittal
    Krishan Kumar
    Sunny Behal
    Proceedings of the Indian National Science Academy, 2023, 89 : 306 - 324