logo

(PDF) Distributed denial of service attack

   

Added on  2021-05-30

14 Pages4765 Words62 Views
 | 
 | 
 | 
Denial of Service and Distributed Denial of ServiceAttacks
(PDF) Distributed denial of service attack_1

AbstractDenial of Service (DoS) and Distributed Denial of Service (DDoS) are both different formsof extreme threats that can have a major effect on a network. These are important threats thatare targeted by hackers and need to be detected and eliminated before any major impact. Thelatest developments in networking by introducing Software Defined Networking (SDN) hasbrought about a robust security features against DoS and DDoS but that is still not capableenough. There have been certain problems that have appeared regarding Cloud Computingwhich has turned out to be a vulnerable area for individual network and require to be tackledon that basis. The study tries to identify recent literatures on these issues, recognize gaps andprovide future recommendations in this respect.Key words: Denial of service, Distributed denial of service, Software Defined Networking
(PDF) Distributed denial of service attack_2

Table of ContentsOverview of the technology involved........................................................................................4Technologies and Applications..................................................................................................5Challenges and problems in the chosen research area...............................................................5Literature Review.......................................................................................................................6Identification of any gaps in the literature.................................................................................6Discussing areas/issues that have been addressed in the current literature............................6Journal 1 - Denial of Service by Sean‐Philip Oriyano......................................................6Journal 2 - Real-time detection of Denial-of-Service attacks in IEEE 802.11p vehicular networks by Nikita Lyamin, Alexey Vinel, Magnus Jonsson and Jonathan Loo...............6Journal 3- A Survey of Security in Software Defined Networks by Sandra Scott-Hayward, Sriram Natarajan and Sakir Sezer......................................................................7Journal 4- Distributed Denial of Service Attacks in Software-Defined Networking with Cloud Computing by Qiao Yan and F. Richard Yu............................................................7Journal 5- Securing Software Defined Networks by Adnan Akhunzada...........................8Highlighting areas/issues that have not been addressed or adequately addressed.................8Journal 1..............................................................................................................................8Journal 2..............................................................................................................................8Journal 3..............................................................................................................................9Journal 4..............................................................................................................................9Journal 5..............................................................................................................................9Discussing on view on the issue.............................................................................................9Journal 1..............................................................................................................................9Journal 2..............................................................................................................................9Journal 3............................................................................................................................10Journal 4............................................................................................................................10Journal 5............................................................................................................................10
(PDF) Distributed denial of service attack_3

Future Directions......................................................................................................................10References................................................................................................................................12
(PDF) Distributed denial of service attack_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents