A survey of distributed denial-of-service attack, prevention, and mitigation techniques

Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article, we present a comprehensive survey of distributed d...

Full description

Bibliographic Details
Main Authors: Tasnuva Mahjabin, Yang Xiao, Guang Sun, Wangdong Jiang
Format: Article
Language:English
Published: SAGE Publishing 2017-12-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147717741463
id doaj-0fe868ee953444d39555314c4f1f2382
record_format Article
spelling doaj-0fe868ee953444d39555314c4f1f23822020-11-25T03:42:55ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772017-12-011310.1177/1550147717741463A survey of distributed denial-of-service attack, prevention, and mitigation techniquesTasnuva Mahjabin0Yang Xiao1Guang Sun2Wangdong Jiang3Department of Computer Science, The University of Alabama, Tuscaloosa, AL, USADepartment of Computer Science, The University of Alabama, Tuscaloosa, AL, USAHunan University of Finance and Economics, Changsha, ChinaHunan University of Finance and Economics, Changsha, ChinaDistributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article, we present a comprehensive survey of distributed denial-of-service attack, prevention, and mitigation techniques. We provide a systematic analysis of this type of attacks including motivations and evolution, analysis of different attacks so far, protection techniques and mitigation techniques, and possible limitations and challenges of existing research. Finally, some important research directions are outlined which require more attentions in near future to ensure successful defense against distributed denial-of-service attacks.https://doi.org/10.1177/1550147717741463
collection DOAJ
language English
format Article
sources DOAJ
author Tasnuva Mahjabin
Yang Xiao
Guang Sun
Wangdong Jiang
spellingShingle Tasnuva Mahjabin
Yang Xiao
Guang Sun
Wangdong Jiang
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
International Journal of Distributed Sensor Networks
author_facet Tasnuva Mahjabin
Yang Xiao
Guang Sun
Wangdong Jiang
author_sort Tasnuva Mahjabin
title A survey of distributed denial-of-service attack, prevention, and mitigation techniques
title_short A survey of distributed denial-of-service attack, prevention, and mitigation techniques
title_full A survey of distributed denial-of-service attack, prevention, and mitigation techniques
title_fullStr A survey of distributed denial-of-service attack, prevention, and mitigation techniques
title_full_unstemmed A survey of distributed denial-of-service attack, prevention, and mitigation techniques
title_sort survey of distributed denial-of-service attack, prevention, and mitigation techniques
publisher SAGE Publishing
series International Journal of Distributed Sensor Networks
issn 1550-1477
publishDate 2017-12-01
description Distributed denial-of-service is one kind of the most highlighted and most important attacks of today’s cyberworld. With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article, we present a comprehensive survey of distributed denial-of-service attack, prevention, and mitigation techniques. We provide a systematic analysis of this type of attacks including motivations and evolution, analysis of different attacks so far, protection techniques and mitigation techniques, and possible limitations and challenges of existing research. Finally, some important research directions are outlined which require more attentions in near future to ensure successful defense against distributed denial-of-service attacks.
url https://doi.org/10.1177/1550147717741463
work_keys_str_mv AT tasnuvamahjabin asurveyofdistributeddenialofserviceattackpreventionandmitigationtechniques
AT yangxiao asurveyofdistributeddenialofserviceattackpreventionandmitigationtechniques
AT guangsun asurveyofdistributeddenialofserviceattackpreventionandmitigationtechniques
AT wangdongjiang asurveyofdistributeddenialofserviceattackpreventionandmitigationtechniques
AT tasnuvamahjabin surveyofdistributeddenialofserviceattackpreventionandmitigationtechniques
AT yangxiao surveyofdistributeddenialofserviceattackpreventionandmitigationtechniques
AT guangsun surveyofdistributeddenialofserviceattackpreventionandmitigationtechniques
AT wangdongjiang surveyofdistributeddenialofserviceattackpreventionandmitigationtechniques
_version_ 1724522687505629184