Academic Journals Database
Disseminating quality controlled scientific knowledge

A Review of DDOS Attack and its Countermeasures in TCP Based Networks

Author(s): Akash Mittal | Ajit Kumar Shrivastava | Manish Manoria

Journal: International Journal of Computer Science and Engineering Survey
ISSN 0976-3252

Volume: 2;
Issue: 4;
Start page: 177;
Date: 2011;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Bloom Filter | DDOS attack | Independent Component Analysis | Trace Back Method | TCP Flow Analysis

Today, Internet is the primary medium for communication which is used by number of users across theNetwork. At the same time, its commercial nature is causing increase vulnerability to enhance cybercrimes and there has been an enormous increase in the number of DDOS (distributed denial of serviceattack) attacks on the internet over the past decade. Network resources such as network bandwidth, webservers and network switches are mostly the victims of DDoS attacks.In this paper basically summarizing different techniques of DDoS and its countermeasures by differentmethods such as Bloom Filter, Trace Back method, Independent Component Analysis and TCP FlowAnalysis.
Affiliate Program     

Tango Rapperswil
Tango Rapperswil