Reverse Engineering and Design Recovery: A Taxonomy
IEEE Software
Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security)
Denial-of-Service Attack-Detection Techniques
IEEE Internet Computing
Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Hi-index | 0.00 |
The article aims to provide a concise introduction to the network protocols and methods of their exploitation. This may lead to instigating DDoS (Distributed Denial of Service) attacks which focus on flooding and saturating elements of victim's physical network infrastructure. In the first part layers of the RFC (Request for Comments) and the OSI (Open Systems Interconnection) models are delimited along with their differences and protocols associated. The HTTP (Hypertext Transfer Protocol) standard is treated preferentially as it forms communication framework of the Internet. The second part focuses on the most prolific type of network incursion currently in use, DDoS, its structure and a freely available tool LOIC (Low Orbit Ion Cannon) utilized to launch it. The third part evaluates specific forms of DDoS, including known measures to counter them. The conclusion summarizes the text and briefly hypothesizes about the future in the field.