Bag om New Methods for Detection of DoS and DDoS Attacks
The Internet revolution has completely changed the traditional ways of functioning of
essential applications including banking, healthcare, defense, academic, and logistics.
Internet-based services replaced these traditional services at a rapid pace over the
past two decades. Growth in internet-dependency of individuals and entities resulted that
the internet is the fundamental support for the information
world.
The emergence of new Internet-based services such as e- governance,
e-procurement, and other services are contributing significantly to the global,
social and economic development. With the exponential growth in Internet-based services and
users worldwide, the internet infrastructure and services are facing numerous challenges
related to continuous attacks.
Distributed Denial of Service (DDoS) is one of the most observed attacks over internet
architecture, posturing robust challenges to defense
mechanisms incorporated in the framework. As the DDoS attack
information is not made public by companies (to avoid deterioration of brand value),
researchers often face the problem of the limited information available to design
effective defensive strategies against DDoS attacks.
The current section presents the impact of DDoS attack and the inherent vulnerability
of the internet architecture. Real events of DDoS attack together with their financial
impact on companies are included. Further, the need for designing an efficient DDoS
defense strategy is presented in the research work.
The internet resources and network systems should be readily accessible for genuine users
who aim to use the services at any specific time . Unavailability of internet services
and applications at the required instance is one of the major challenges restricting the spread
of Internet-based services. The unavailability can results to either intentional
causes or accidental causes. The basic internet framework is designed to handle accidental
failures but is not efficient against intentional purposes such as intrusion, malware,
hacking, etc.
The Denial-of-Service (DoS) attack is categorized under intentional failures observed on the
internet, which are caused by malware programmers or intruders. These attackers
deny or compromise the availability of internet resources to genuine or authorized users.
Vis mere