Survey on DDoS Attacks and its Detection & Defence Approaches
Nisha H. Bhandari
Ms. Nisha H. Bhandari, PG Scholar, Department of Computer Science & Technology, Gujarat Technological University, Ahmedabad, (Gujrat), India.
Manuscript received on February 05, 2013. | Revised Manuscript received on February 12, 2013. | Manuscript published on February 15, 2013. | PP: 67-71 | Volume-1 Issue-3, February 2013. | Retrieval Number: C0153020213/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In Cloud environment, cloud servers providing requested cloud services, sometimes may crash after receiving huge amount of request. This situation is called Denial Of service attack. Cloud Computing is one of today’s most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Cloud Computing is changing the IT delivery model to provide on-demand self-service access to a shared pool of computing resources (physical and virtual) via broad network access to offer reduced costs, capacity utilization, higher efficiencies and mobility. Recently Distributed Denial of Service (DDoS) attacks on clouds has become one of the serious threats to this buzzing technology. Distributed Denial of Service (DDoS) attacks continue to plague the Internet. Distributed Denial-of-Service (DDoS) attacks are a significant problem because they are very hard to detect, there is no comprehensive solution and it can shut an organization off from the Internet. The primary goal of an attack is to deny the victim’s access to a particular resource. In this paper, we want to review the current DoS and DDoS detection and defence mechanism.
Keywords: Cloud Computing, Distributed Denial of Service (DDoS) attack, TTL, Hop-count, and packet marking.