An overview of DDoS attacks based on DNS

作者: Kamal Alieyan , Mohammed M. Kadhum , Mohammed Anbar , Shafiq Ul Rehman , Naser K. A. Alajmi

DOI: 10.1109/ICTC.2016.7763485

关键词: Software security assuranceDenial-of-service attackComputer networkComputer scienceBotnetServerMariposa botnetApplication layer DDoS attackDomain Name SystemThe InternetComputer security

摘要: … A survey has been carried out by the Arbor Networks 11th Annual Worldwide Infrastructure … Commercial anti-DDoS services and equipment providers mostly provides built in anti-…

参考文章(32)
Randolph Marchany, Jung-Min Park, Ruiliang Chen, TRACK: A Novel Approach for Defending Against Distributed Denial-of-Service Attacks ,(2005)
Georgios Kambourakis, Tassos Moschos, Dimitris Geneiatakis, Stefanos Gritzalis, Detecting DNS Amplification Attacks Critical Information Infrastructures Security. pp. 185- 196 ,(2008) , 10.1007/978-3-540-89173-4_16
Boris Sieklik, Richard Macfarlane, William J. Buchanan, Evaluation of TFTP DDoS amplification attack Computers & Security. ,vol. 57, pp. 67- 92 ,(2016) , 10.1016/J.COSE.2015.09.006
Matthew Orlinski, Matthias Wählisch, Christian Rossow, Thomas C. Schmidt, Fabrice J. Ryba, Amplification and DRDoS Attack Defense - A Survey and New Perspectives. arXiv: Networking and Internet Architecture. ,(2015)
M. Iqbal Saripan, Mohd Fadlee A. Rasid, Samaneh Rastegari, Detection of Denial of Service Attacks against Domain Name System Using Neural Networks arXiv: Cryptography and Security. ,(2009)
Sunghyuck Hong, Efficient and secure DNS cyber shelter on DDoS attacks Journal of Computer Virology and Hacking Techniques. ,vol. 11, pp. 129- 136 ,(2015) , 10.1007/S11416-014-0230-Y
Shui Yu, Wanlei Zhou, Weijia Jia, Song Guo, Yong Xiang, Feilong Tang, Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient IEEE Transactions on Parallel and Distributed Systems. ,vol. 23, pp. 1073- 1080 ,(2012) , 10.1109/TPDS.2011.262
Christian Rossow, Amplification Hell: Revisiting Network Protocols for DDoS Abuse network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23233