Distributed Denial of Service (DDoS): A History

被引:9
|
作者
Brooks, Richard R. [1 ]
Yu, Lu [1 ]
Ozcelik, Ilker [2 ]
Oakley, Jon [3 ]
Tusing, Nathan [4 ]
机构
[1] Clemson Univ, Holcombe Dept Elect & Comp Engn, Clemson, SC 29634 USA
[2] Recep Tayyip Erdogan Univ, Dept Comp Engn, TR-53100 Merkez Rize, Turkey
[3] Clemson Univ, Clemson, SC 29634 USA
[4] Clemson Univ, Holcombe Dept Elect & Comp Engn, Comp Engn, Clemson, SC 29634 USA
基金
美国国家科学基金会;
关键词
Denial-of-service attack;
D O I
10.1109/MAHC.2021.3072582
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early Internet, DDoS attacks have persisted. This article presents the technologies and tools that are used in DDoS, followed by a timeline of the major DDoS incidents. This is followed by a discussion of the primary classes of DDoS incidents and how the computing ecosystem enables DDoS. Early attacks were related to hacker culture, but their focus quickly changed to commercial exploitation. There have also been a number of political uses of DDoS, including cyberwar, hacktivism, and terrorism.
引用
收藏
页码:44 / 54
页数:11
相关论文
共 50 条
  • [21] Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
    Osanaiye, Opeyemi
    Choo, Kim-Kwang Raymond
    Dlodlo, Mqhele
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 67 : 147 - 165
  • [22] A Review on Distributed Denial of Service (DDoS) Mitigation Techniques in Cloud Computing Environment
    Ahamed, Junath Naseer
    Iyengar, N. Ch. S. N.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 277 - 294
  • [23] DISTRIBUTED DENIAL OF SERVICE (DDOS) NETWORK ATTACKS: IMPACT ON THE VIRTUAL LEARNING ENVIRONMENT
    Atayero, A. A.
    Oshin, O. I.
    Oshin, B. O.
    Alatishe, A. S.
    ICERI2014: 7TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2014, : 2235 - 2240
  • [24] Mass network flooding attacks (distributed denial of service - DDoS) surface in the wild
    Hancock, B
    COMPUTERS & SECURITY, 2000, 19 (01) : 6 - 7
  • [25] Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud
    Alzahrani, Saba
    Hong, Liang
    2018 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2018), 2018, : 35 - 36
  • [26] Distributed Denial of Service (DDoS) Attacks Detection Using Machine Learning Prototype
    Hoyos Ll, Manuel S.
    Isaza E, Gustavo A.
    Velez, Jairo I.
    Castillo O, Luis
    DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, (DCAI 2016), 2016, 474 : 33 - 41
  • [27] Distributed Denial of Service (DDoS) Attacks in Software-defined Networks (SDN)
    Chahal, Jasmeen Kaur
    Kaur, Puninder
    Sharma, Avinash
    2021 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2021, : 291 - 295
  • [28] Distributed Denial of Service (DDoS) Mitigation Using Blockchain-A Comprehensive Insight
    Wani, Sharyar
    Imthiyas, Mohammed
    Almohamedh, Hamad
    Alhamed, Khalid M.
    Almotairi, Sultan
    Gulzar, Yonis
    SYMMETRY-BASEL, 2021, 13 (02): : 1 - 21
  • [29] A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
    Zargar, Saman Taghavi
    Joshi, James
    Tipper, David
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (04): : 2046 - 2069
  • [30] A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments
    Dong, Shi
    Abbas, Khushnood
    Jain, Raj
    IEEE ACCESS, 2019, 7 : 80813 - 80828