An Overview of Defense Techniques Against DoS Attacks

被引:0
|
作者
Afzaal, Muhammad [1 ]
机构
[1] AlAin Univ, Coll Engn, Al Ain, U Arab Emirates
关键词
DoS Attacks; Denial of Services Attacks; DoS Attacks Preventive Measures; Denial Services Attacks Preventions; DDoS Attack;
D O I
10.1109/IOTSMS58070.2022.10062168
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Denial of Service (DoS) attack is a common type of cyberwarfare and as the name shows that its basic purpose is to stop services for legitimate users. It is different from hacking something such as unauthorized access, steal sensitive information, or leak information, etc. Our research provides the historical attacks, prediction, and types of DoS as well as its defenses. There are different defense mechanisms for several DoS attacks. We categorize these tools and techniques into two types i.e. client-side defense and server-side defense. So, the server-side defense tools are more effective and convenient but client-side defenses are difficult to deploy to the whole world. However, this is very important for identifying, mitigating, and preventing the DoS attacks for national and commercial security.
引用
收藏
页码:101 / 108
页数:8
相关论文
共 50 条
  • [31] Securing Distributed SDN Controllers Against DoS Attacks
    Etaiwi, Wael
    Biltawi, Mariam
    Almajali, Sufyan
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 203 - 206
  • [32] Secure SCTP against DoS attacks in wireless Internet
    Joe, Inwhee
    Network Control and Engineering for QoS, Security and Mobility, V, 2006, 213 : 65 - 74
  • [33] Defending RFID authentication protocols against DoS attacks
    Dang Nguyen Duc
    Kim, Kwangjo
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 384 - 390
  • [34] A survey of the mitigation methods against DoS attacks on MANETs
    Alsumayt, Albandari
    Haggerty, John
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 538 - 544
  • [35] An overview of phishing attacks and their detection techniques
    Dadkhah, Mehdi
    Jazi, Mohammad Davarpanah
    Mobarakeh, Majid Saidi
    Shamshirband, Shahaboddin
    Wang, Xiaojun
    Raste, Sachin
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (04) : 187 - 195
  • [36] An overview of phishing attacks and their detection techniques
    Dadkhah M.
    Jazi M.D.
    Mobarakeh M.S.
    Shamshirband S.
    Wang X.
    Raste S.
    Dadkhah, Mehdi (dadkhah80@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09): : 187 - 195
  • [37] Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey
    Wu Zhijun
    Li Wenjing
    Liu Liang
    Yue Meng
    IEEE ACCESS, 2020, 8 : 43920 - 43943
  • [38] Defense against DoS Attack: PSO Approach in Virtualization
    Mercyshalinie, S.
    Madhupriya, G.
    Vairamani, S.
    Velayutham, S.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 199 - 204
  • [39] Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks
    Dener, Murat
    Bay, Omer Faruk
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [40] Defense against DoS and load altering attacks via model-free control: A proposal for a new cybersecurity setting
    Fliess, Michel
    Join, Cedric
    Sauter, Dominique
    5TH CONFERENCE ON CONTROL AND FAULT-TOLERANT SYSTEMS (SYSTOL 2021), 2021, : 58 - 65