Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published August 1, 2020 | Version v1
Journal article Open

A comprehensive study of distributed Denial-of-Service attack with the detection techniques

  • 1. Universiti Tun Hussein Onn Malaysia
  • 2. Universiti Kebangsaan Malaysia
  • 3. University of Basrah

Description

With the dramatic evolution in networks nowadays, an equivalent growth of challenges has been depicted toward implementing and deployment of such networks. One of the serious challenges is the security where wide range of attacks would threat these networks. Denial-of-Service (DoS) is one of the common attacks that targets several types of networks in which a huge amount of information is being flooded into a specific server for the purpose of turning of such server. Many research studies have examined the simulation of networks in order to observe the behavior of DoS. However, the variety of its types hinders the process of configuring the DoS attacks. In particular, the Distributed DoS (DDoS) is considered to be the most challenging threat to various networks. Hence, this paper aims to accommodate a comprehensive simulation in order to figure out and detect DDoS attacks. Using the well-known simulator technique of NS-2, the experiments showed that different types of DDoS have been characterized, examined and detected. This implies the efficacy of the comprehensive simulation proposed by this study.

Files

39 21266 10feb 2feb 21oct19 arf.pdf

Files (734.4 kB)

Name Size Download all
md5:17580e20a06b0b1ccb4ab03018ead135
734.4 kB Preview Download