A Survey on Network-Based DoS and DDoS Attack and Defense Mechanisms
Author(s):
Dr.N.Arumugam
Keywords:
Network Security, DoS attacks, DDoS attacks, IP Spoofing, Time-to-Live
Abstract
Today, the Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of millions of people worldwide. The phenomenal growth of the Internet owes much to the simplicity of its design principles, which allow to widely interconnecting heterogeneous systems. The design principles of Internet’s do not provide any form of control for a server to dictate how much traffic it wants to receive and from whom. As a result, Internet hosts are vulnerable to network attacks like Denial-of-Service (DoS) and Distributed-Denial-of-Service (DDoS) attacks, whose economic and social impact has grown to considerable proportions. One of the major threats to the Internet is source IP address spoofing. In current Internet communication world, validity of the source of IP packet is an important issue. The problems of IP spoofing alarm legitimate users of the Internet. This paper review recent progress of IP spoofing detection and defenses by various researchers.
Article Details
Unique Paper ID: 147095

Publication Volume & Issue: Volume 1, Issue 7

Page(s): 698 - 706
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews