International Journal of Modern Education and Computer Science (IJMECS)

ISSN: 2075-0161 (Print), ISSN: 2075-017X (Online)

Published By: MECS Press

IJMECS Vol.6, No.1, Jan. 2014

Distributed Denial of Service Attacks: A Review

Full Text (PDF, 179KB), PP.65-71

Views:168   Downloads:4


Sonali Swetapadma Sahu,Manjusha Pandey

Index Terms

Distributed Denial of Service attack;Wireless Sensor Network;Networks; Detection;Prevention;


A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

Cite This Paper

Sonali Swetapadma Sahu, Manjusha Pandey,"Distributed Denial of Service Attacks: A Review", IJMECS, vol.6, no.1, pp.65-71, 2014.DOI: 10.5815/ijmecs.2014.01.07


[1]Mr. I. B. Mopari, Prof S. G. Pukale, Prof M. L. Dhore," Detection and Defense against DDoS Attack with IP Spoofing", International Conference on Computing, Communication and Networking, IEEE, 2008.

[2]Chin-Ling Chen, Chih-Yu Chang," A Two-Tier Coordinated Defense Scheme against DDoS Attacks", IEEE, 2011.

[3]Yongping Zhang, Zhuqing Wan, Mingming Wu," An Active DDoS Defense Model Based on Packet Marking", Second International Workshop on Computer Science and Engineering, IEEE, 2009.

[4]Huey-Ing Liu, Kuo-Chao Chang," Defending Systems against Tilt DDoS Attacks", The 6th International Conference on Telecommunication Systems, Services, and Applications, IEEE, 2011.

[5]YiZhang, QiangLiu, Guofeng Zhao," A Real-Time DDoS Attack Detection and Prevention System Based on per-IP Traffic Behavioral Analysis", IEEE, 2010.

[6]Yonghua You, Mohammad Zulkernine, Anwar Haque," A Distributed Defense Framework for Flooding-Based DDoS Attacks", The Third International Conference on Availability, Reliability and Security, IEEE, 2008.

[7]Thaneswaran Velauthapillai, Aaron Harwood and Shanika Karunasekera," Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network", Fourth International Conference on Network and System Security, IEEE, 2010.

[8]Yang-Seo Choi, Jin-Tae Oh, Jong-Soo Jang, Jae-Cheol Ryou," Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention.

[9]S. Renuka Devi, P. Yogesh," An Effective Approach to Counter Application Layer DDoS Attacks", IEEE, ICCCNT'12.

[10]Chengxu Ye, Kesong Zheng, Chuyu She," Application layer DDoS detection using clustering analysis",2nd International Conference on Computer Science and Network Technology, IEEE, 2012.

[11]Jiawei Chen," Broadcast Authentication Protocol Scheme Based on DBP-MSP and Safe Routing in WSN against DDoS Attacks", Second International Conference on Networking and Distributed Computing, IEEE, 2011.

[12]Yu Chen, Wei-Shinn Ku, Kazuya Sakai, Christopher DeCruze,"A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages", IEEE CCNC, 2010.

[13]Radwane Saad, Farid Nait-Abdesselam, Ahmed Serhrouchni," A Collaborative Peer-to-Peer Architecture to Defend Against DDoS Attacks", IEEE, 2008.

[14]Huizhong Sun, Wingchiu Ngan, H. Jonathan Chao," RateGuard: A Robust Distributed Denial of Service (DDoS) Defense System", IEEE, 2009.

[15]Zaihong Zhou, Biwei Qian, Xiaomei Tian, Dongqing Xie," Fast Traceback against Large-Scale DDoS Attack in High-speed Internet", IEEE, 2009.

[16]Ping Du, Akihiro Nakao," Mantlet Trilogy: DDoS Defense Deployable with Innovative Anti-Spoofing, Attack Detection and Mitigation", IEEE, 2010.

[17]Feng Liang, Xinjian Zhao, David Yau, "Real Time IP Traceback with Adaptive Probabilistic Packet Marking". Journal of Software, 2003.14(5).pp.1005-1010.

[18]Cheng Jin and Kang G.Shin, "Defense against Spoofed IP Traffic Using Hop-Count Filtering", IEEE/ACM Trans. Networking, vol.15 No. I, Feb 2007.

[19]X. Du, M. Guizani, Y. Xiao, H. Chen, "Defending Dos Attack on Broadcast Authentication in Wireless Sensor Networks," In Proceeding of IEEE Communication Society subject matter experts for publication in the ICC 2008.