A Survey on Characterization of Defense Mechanisms in DDOS Attacks
Rajeshwari. S1, Malathi. K2, Regina.B3
1Rajeshwari.S, Assistant Professor, Computer Science & Engineering Department, of Engineering, Saveetha University, Chennai, India.
2Malathi.K,Assistant Professor,  Computer Science and Engineering Department, of Engineering, Saveetha University, Chennai, India.
3Regina.B, Assistant Professor(SG), Computer Science and Engineering Department, of Engineering, Saveetha University, Chennai, India.
Manuscript received on November 22, 2013. | Revised Manuscript received on December 16, 2013. | Manuscript published on December 30, 2013. | PP: 321-324 | Volume-3, Issue-2, December 2013. | Retrieval Number:  B2477123213/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Distributed Denial of Service (DDoS) Attack is a poisonous threat to our security professionals. DDoS Attack is defined as the attack which targets one or more systems using multiple systems which are compromised usually by Trojan Horse at the same instance of time. D Dos Attack does not allow legitimate users to access their resource and their services by taking advantage of the system vulnerability .DDoS Attack is independent of the protocols used .The goals of DDoS Attack is Twofold. First it overloads the server which may lead to crash and the second goal is to acquire and steal the bandwidth by generating a large scale of traffic. The attack is set up by a Master called as Bot Master by controlling armies of system to attack which is injected by malware called as Botnets. Effective and Collaborative Defense Mechanisms for DDoS Attack in Wired Network Systems is the main Scope of Intrusion Detection. Exploration of defense mechanisms for DDoS Flooding Attack in Wired Network Systems along with their classification and study of various structures of Botnets is discussed in this paper. We also highlight all the techniques already used before the attack, during the attack and after the attack. As application level attacks are common and stealthier when compared to network /transport level attacks we focus more on http DDoS flooding attacks.
Keywords: DDoS (Distributed denial of service) Attacks ,Trojan Horse ,Bot Master, Collaborative Defense Mechanisms, Http DDoS flooding attacks, Intrusion Detection, application level attacks.