Distributed Denial of Service (DDoS): A History

被引:9
|
作者
Brooks, Richard R. [1 ]
Yu, Lu [1 ]
Ozcelik, Ilker [2 ]
Oakley, Jon [3 ]
Tusing, Nathan [4 ]
机构
[1] Clemson Univ, Holcombe Dept Elect & Comp Engn, Clemson, SC 29634 USA
[2] Recep Tayyip Erdogan Univ, Dept Comp Engn, TR-53100 Merkez Rize, Turkey
[3] Clemson Univ, Clemson, SC 29634 USA
[4] Clemson Univ, Holcombe Dept Elect & Comp Engn, Comp Engn, Clemson, SC 29634 USA
基金
美国国家科学基金会;
关键词
Denial-of-service attack;
D O I
10.1109/MAHC.2021.3072582
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early Internet, DDoS attacks have persisted. This article presents the technologies and tools that are used in DDoS, followed by a timeline of the major DDoS incidents. This is followed by a discussion of the primary classes of DDoS incidents and how the computing ecosystem enables DDoS. Early attacks were related to hacker culture, but their focus quickly changed to commercial exploitation. There have also been a number of political uses of DDoS, including cyberwar, hacktivism, and terrorism.
引用
收藏
页码:44 / 54
页数:11
相关论文
共 50 条
  • [31] Denial of service and distributed denial of service attacks
    Piskozub, A
    MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2002, : 303 - 304
  • [32] Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment - A Survey on DDoS Attack Tools and Traceback Mechanisms
    Kumar, Arun Raj P.
    Selvakumar, S.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1275 - 1280
  • [33] Fog Computing as a defensive approach against Distributed Denial of Service (DDoS): a proposed architecture
    Paharia, Bhumika
    Bhushan, Kriti
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [34] Superpoint-Based Detection Against Distributed Denial of Service (DDoS) Flooding Attacks
    Jiang, Hong
    Chen, Shuqiao
    Hu, Hongchao
    Zhang, Mingming
    2015 IEEE 21ST INTERNATIONAL WORKSHOP ON LOCAL & METROPOLITAN AREA NETWORKS (LANMAN), 2015,
  • [35] A Comprehensive Review of Distributed Denial-of-Service (DDoS) Attacks: Techniques and Mitigation Strategies
    Alomari, Mariam
    Alsadah, Sharifa
    Aldahmash, Noura
    Alghulaygah, Hana
    Alogaiel, Razan
    Saqib, Nazar Abbas
    PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 215 - 222
  • [36] Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT)
    Ali, Mohammed Hasan
    Jaber, Mustafa Musa
    Abd, Sura Khalil
    Rehman, Amjad
    Awan, Mazhar Javed
    Damasevicius, Robertas
    Bahaj, Saeed Ali
    ELECTRONICS, 2022, 11 (03)
  • [37] A Stabilizing Architecture for Cloud Control System against Distributed Denial of Service (DDoS) Attack
    Ali, Yasir
    Xia Yuanqing
    Ma, Liang
    2017 CHINESE AUTOMATION CONGRESS (CAC), 2017, : 3423 - 3428
  • [38] A pattern recognition scheme for Distributed Denial of Service (DDoS) attacks in wireless sensor networks
    Baig, Z. A.
    Baqer, M.
    Khan, A. I.
    18TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 3, PROCEEDINGS, 2006, : 1050 - +
  • [39] Evaluation of Experiments on Detecting Distributed Denial of Service (DDoS) Attacks in Eucalyptus Private Cloud
    Lonea, Alina Madalina
    Popescu, Daniela Elena
    Prostean, Octavian
    Tianfield, Huaglory
    SOFT COMPUTING APPLICATIONS, 2013, 195 : 367 - 379
  • [40] Denial of service and distributed denial of service - Today and tomorrow
    Meyer, L
    Penzhorn, WT
    2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 959 - 964