International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 7, July 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Different Types Of Distributed Denial Of Service Attack Detection And Prevention Techniques

[Full Text]



P. Subhashini, K. Sai Nithin, Ms. E. Hemalatha, Dr. Akalpita Das



DoS, Distributed Denial of Service (DDoS) attack, Security, Cloud Computing



Distributed Denial of Service (DDoS) attack is a Denial of Service (DoS) attack that is made in large scale over a potential service in distributed environment. Adversaries targeting such attack makes a sustainable effort to exploit software vulnerabilities in computers through which attack is made on a target server. Such computers that unwittingly cooperate attacker are known as zombies where attacker keeps malicious piece of software known as agent. As countermeasures are being developed from time to time, the attackers are enhancing their tools to launch DDoS attacks. In this context, it is essential to have counter measures that defend existing and future DDoS variants. However, it needs thorough understanding pertaining to scope and detection methods for handling such massive attacks. This paper provides insights on different terms associated with DDoS attacks, different attack types and counter-measures existing. It also covers the attacks and countermeasures in cloud computing. Provided comprehension of the DDoS attacks and their scope, it is possible to device new countermeasures for well-known and future DDoS attacks.



[1] Luo, H., Chen, Z., Li, J., & Vasilakos, A. V. (2017). Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers. IEEE Transactions on Information Forensics and Security, 12(8), 1801–1815.
[2] Hossein Rouhani Zeidanloo, Mohammad Jorjor Zadeh shooshtari, Payam Vahdani Amoli,M.
Safari and Mazdak Zamani. (2010). A Taxonomy of Botnet Detection Techniques. IEEE, p1-5.
[3] Jerome Fran¸cois, Shaonan Wang, Radu State, and Thomas Engel. (2011). BotTrack: Tracking Botnets using NetFlow and PageRank. IEEE, p1-15.
[4] Kumar V. P., Sundaram, A. P., Kumar M. B., and Iyengar N. Ch. S. N (2011). Analysis ofDDoS Attacks in Distributed Peer to Peer Networks. Journal of Global Research in ComputerScience, 2(7), p10-16.
[5]Monowar H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya and J. K. Kalita. (2012). DetectingDistributed Denial of Service Attacks: Methods, Tools and Future Directions. The ComputerJournal, p1-20.
[6] Opeyemi.A.Osanaiye. (2015). hort Paper: IP Spoofing Detection for Preventing DDoS Attack in Cloud Computing . International Conference on Intelligence in Next Generation Networks, p139-141.
[7] Carlin, A., Hammoudeh, M., &Aldabbas, O. (2015). Defence for Distributed Denial of Service Attacks in Cloud Computing. Procedia Computer Science, 73, 490–497.
[8] Choi, J., Choi, C., Ko, B., & Kim, P. (2014). A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Computing, 18(9), 1697–1703.
[9] MohdNazri Ismail, AbdulazizAborujilah, Shahrulniza Musa and AAmirShahzad. (2012). New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment . International Journal of Computer Science and Security . 6 (4), p1-12.
[10] J. Francois, I. Aib, and R. Boutaba, “Firecol: a Collaborative Protection Network for the Detection of Flooding ddos Attacks,” IEEE/ACM Trans. on Netw., vol. 20, no. 6, Dec. 2012, pp. 1828-1841.
[11] Y. Xiang, K. Li, W. Zhou, “Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics,” IEEE Trans. on Inf. Foren. and Sec., vol. 6, no. 2, pp. 426 - 437, May 2011.
[12] T. Koponen, S. Shenker, H. Balakrishnan, N. Feamster, I. Ganichev, A. Ghodsi, P. B. Godfrey, N. McKwoen, G. Parulkar, B. Raghavan, J. Rexford, S. Arianfar, D. Kuptsov, “Architecting for innovation,” ACM Comput. Commun. Rev., vol. 41, no. 3, July 2011,
[13] X. Liu, X. Yang, and Y. Lu, “To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-node Botnets,” In Proc. SIGCOM- M’08, Aug. 2008, Seattle, WA, USA.
[14] P. B. Godfrey, I. Ganichev, S. Shenker, and I. Stoica, “Pathlet routing,” in Proc. SIGCOMM’09, Aug. 2009, Barcelona, Spain, pp. 111 - 122.
[15] H. Luo, Z. Chen, J. Cui, H. Zhang, M. Zukerman, C. Qiao, “CoLoR: an information-centric internet architecture for innovations,” IEEE Network, vol. 28, no. 3, pp. 4 - 10, May 2014.
[16] L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, kc claffy, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang, “Named data networking,” ACM Comput. Commun. Rev., vol. 44, no. 3, pp. 66 - 73, Jul. 2014.
[17] D. Raychaudhuri, K. Nagaraja, A. Venkataramani, “MobilityFirst: a ro- bust and trustworthy mobility-centric architecture for the future Internet,” Mobile Comput. and Comm. Rev., vol. 16, no. 3, pp. 2 - 13, Jul. 2012.
[18] M. Antikainen, T. Aura, M. Sarela, “Denial-of-service attacks in bloom- filter-based forwarding,” IEEE/ACM Trans. on Netw., vol. 22, no. 5, pp. 1463 - 1476, Oct. 2014.
[19] H. Luo, Z. Chen, J. Cui, H. Zhang, “An Approach for Efficient, Accurate, and Timely Estimation of Traffic Matrices,” In Proc. IEEE Global Internet Symposium (GI’14), May 2014, Toronto, Canada, pp. 67-72.
[20] H. Luo, J. Cui, Z. Chen, M. Jin, H. Zhang, “Efficient integration of software defined networking and information-centric networking with CoLoR,” in Proc. IEEE GLOBECOM’14, Dec. 2014, Austin, TX, USA, pp. 1962-1967.