Launching distributed denial of service attacks by network protocol exploitation

  • Authors:
  • Jasek Roman;Benda Radek;Vala Radek;Sarga Libor

  • Affiliations:
  • Department of Informatics and Artificial Intelligence, Faculty of Applied Informatics, Tomas Bata University in Zlin, Zlin, Czech Republic;Department of Statistics and Quantitative Methods, Faculty of Management and Economics, Tomas Bata University in Zlin, Zlin, Czech Republic;Department of Informatics and Artificial Intelligence, Faculty of Applied Informatics, Tomas Bata University in Zlin, Zlin, Czech Republic;Department of Statistics and Quantitative Methods, Faculty of Management and Economics, Tomas Bata University in Zlin, Zlin, Czech Republic

  • Venue:
  • AICT'11 Proceedings of the 2nd international conference on Applied informatics and computing theory
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The article aims to provide a concise introduction to the network protocols and methods of their exploitation. This may lead to instigating DDoS (Distributed Denial of Service) attacks which focus on flooding and saturating elements of victim's physical network infrastructure. In the first part layers of the RFC (Request for Comments) and the OSI (Open Systems Interconnection) models are delimited along with their differences and protocols associated. The HTTP (Hypertext Transfer Protocol) standard is treated preferentially as it forms communication framework of the Internet. The second part focuses on the most prolific type of network incursion currently in use, DDoS, its structure and a freely available tool LOIC (Low Orbit Ion Cannon) utilized to launch it. The third part evaluates specific forms of DDoS, including known measures to counter them. The conclusion summarizes the text and briefly hypothesizes about the future in the field.