logo

ITC595 Research Project (Distributed Denial of Service Attacks)

Denial of service and distributed denial of service attacks is a type of attack where a “Trojan” virus attacked several computers are used to attack a single computer system resulting a denial of access.

6 Pages3302 Words205 Views
   

Added on  2023-06-12

About This Document

This research project focuses on the analysis, detection, and prevention of distributed denial of service (DDOS) attacks. Techniques such as artificial neural networks, filtering and rate limiting, and active networks are discussed. The proposed design for detecting and preventing DDOS attacks involves installing DDOS detectors in every network and using encrypted messages to communicate with other detectors. The study justifies the need for research in this area due to the popularity and widespread use of DDOS attacks by cyber criminals.

ITC595 Research Project (Distributed Denial of Service Attacks)

Denial of service and distributed denial of service attacks is a type of attack where a “Trojan” virus attacked several computers are used to attack a single computer system resulting a denial of access.

   Added on 2023-06-12

ShareRelated Documents
ITC595 Research Project (Distributed Denial of Service Attacks)
Distributed Denial of Service Attacks
MAY 5, 2018
ITC595 Research Project (Distributed Denial of Service Attacks)_1
Table of Contents
INTRODUCTION..............................................................................................................................................1
Research Problem...........................................................................................................................................1
Research Justification.....................................................................................................................................2
LITERATURE REVIEW...................................................................................................................................2
Drape Architecture.........................................................................................................................................2
Artificial Neutral Network.............................................................................................................................2
Active networks, Gateways and Routing Protocols.......................................................................................2
Filtering and Rate Limiting............................................................................................................................2
Related Work.................................................................................................................................................3
Conceptual Framework..................................................................................................................................3
CONCLUSION..................................................................................................................................................4
ACKNOWLEDGEMENT.................................................................................................................................4
References..........................................................................................................................................................4
ITC595 Research Project (Distributed Denial of Service Attacks)_2
ITC595 Research Project (Distributed Denial of Service Attacks)
A. Author
ITC595 MIT, School of Computing & Mathematics, Charles Sturt University
author@first-third.edu.au
ABSTRACT
Denial of service and distributed denial of service attacks is a
type of attack where a “Trojan” virus attacked several
computers are used to attack a single computer system resulting
a denial of access. The target computer is blocked by this attack
and both the targeted system and all the Trojan affected
systems are controlled by the hackers (Yan et al., 2016). The
technique is flooding the victim’s system by malicious attacks
using viruses originated from several sources. The number of
attacking systems range from hundreds to thousands. It cannot
be stopped by only blocking the Ip addresses as there is no
proper system to distinguish legitimate and illegitimate traffic
when the attack is spread widely from different systems (Lim et
al., 2014). There is a basic difference between the DOS and
DDOS attack that is the denial of service is executed using one
computer and Ip address to flood the victim’s system. On the
other hand DDOS attack is done by using several computers
and internet connections to flood the victim’s system by
generating network traffic. There are mainly three types of
DDOS attack namely bandwidth attack, traffic attack and
application attack.
The key security challenges of DDOS attack is to
distinguish the illegitimate traffic and block them from
attacking the computer system. Another challenge is to stop
spreading of “Trojan” virus which affects the computer systems
used for DDOS attack. There are diverse methods of OS attack
so executing DD it is a challenge for the security researchers to
stop DDOS and DOS attacks.
I have selected this as my area of research because
these types of attacks are one of the most popular and widely
used attacks by cyber criminals.
Keywords
DDOS - Denial of Service Distributed System
IP - Internet Protocol
Trojan Virus
Hackers
INTRODUCTION
Nowadays the modern networks have been suffering due to
security and the vulnerabilities despite them being from
different originalities may it be from manufacturers or for the
purpose they are used for, nevertheless it has become like
impossible and very difficult technically and economically
becoming not even feasible because when creating and
maintain the already in existence systems and ensuring that
both the system and the networks associated are not either
susceptible from attacks and much more threats [1]. The use of
Intrusion detection system has been widely used as security
tool in ensuring safety of the network which can be used by the
experts in even if the attack are from different sources [2]. This
detection system tool has emerged as one of the best prevention
tool, which is powerful as it is used in dealing with the security
of the data and the issues that may arise due to network
communications.
The attacks have a lot of influence over the networks and the
overall systems as they interfere with the performance of the
network, security of the data and much more the loss of the
intellectual property [3]. The purpose of this study is coming
up with a research that will be used in proposing and utilizing
the good framework for studying the security policies that will
be used for providing defenses against the DDOS attacks. The
emergence of DDOS attacks have taken down many web sites
and hence imposing a lot losses in finance in many companies.
Research Problem
The denial of service attack is an attack which is taken in to
consideration when one access in to a PC or in to resources of
the network is intentionally blocked or even being degraded
which may be as a result of malware that might have been
performed by another user. This attack may not necessarily
affect the data directly or either permanent, but they may intend
to compromise the resource availability. DDOS usually
manifests itself through many multiple hosts on the web by
saturating the bandwidth of the victims who are connected in
the network. In Distributed denial of service attack, the attacker
can trigger 10,000 attacks contemporaneously on the targets by
use of internet nodes, which are not protected globally in
coordinating those attacks.
There are so many defenses against the DDOS attacks that
have been considered and proposed. In deploying, the defenses
that are used against the DDOS attacks a network router will
have to be used, however the internet service providers will be
needed to do some configurations on the router in order for
them to prevent the traffic that is attacked from reaching to the
network that is connected by the subscribers. Nevertheless,
there has been many cases where the ISP has hesitated in
deploying the stated defenses that are due many practical
concerns. Each defense has different mechanisms used to
distinguish the attack traffic from the traffic that is normal to
different victims and the non-victims as the defense may
mistakenly regard the normal as the attack traffic. It has been
uncertain to how the efficiency of the defenses have been in
maintenance of the network connections that are available with
respect to the normal traffic of real victims and the non-victims
while in real sense then defenses are used for controlling the
attack traffic.
Secondly, the above imposition by the router defenses is
uncertain. Thirdly, no defenses has provided any mechanism to
be used by Internet Service Providers in knowing the
preferences of their subscribers in defense selection and
parameters negotiations in defense as it will be a fact when
tradeoff occurs. The questions we have to ask ourselves are
such as the how good a defense that will be if the Internet
Service Providers are compliant and they install the defenses.
Research Justification
The definition of DDOS has emphasized on the on three
very important aspects. This justifies that distributed denial of
service is a denial of service attack, however this has been
ITC595 Research Project (Distributed Denial of Service Attacks)_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Distributed Denial of Service
|10
|2237
|162

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61

Computer Security: Understanding Distributed Denial of Service Attack
|13
|2230
|463

Distributed Denial of Service (DDoS) Attack: An Overview and Real World Example
|10
|2158
|245

Network Devices Security: Threats, Potential Damages, and Mitigation Strategies
|6
|1897
|178

Computer Security: Melbourne IT Attack
|10
|2318
|138