A Survey of Distributed Denial of Service (DDoS) Attack Mitigation Techniques

  IJCTT-book-cover
 
         
 
© 2024 by IJCTT Journal
Volume-72 Issue-12
Year of Publication : 2024
Authors : Rajender Pell Reddy
DOI :  10.14445/22312803/IJCTT-V72I12P108

How to Cite?

Rajender Pell Reddy, "A Survey of Distributed Denial of Service (DDoS) Attack Mitigation Techniques," International Journal of Computer Trends and Technology, vol. 72, no. 12, pp. 69-77, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I12P108

Abstract
One of the biggest and continuous challenges to the availability of online services currently is Distributed Denial of Service (DDoS) attacks. These attacks seek to deny users and/or network resources access to a specific server, service or network through its inundation with a large number and threatening traffic. Besides making the target system unusable, this leads to tremendous operational and financial losses for organizations. Botnets, amplification attacks, various evasion techniques, etc., are all piling on the pressure as attackers’ sophistication increases, meaning traditional security measures are ineffective. Many techniques have been evolved to prevent or mitigate these attacks, such as the simple ones, like rate limiting and IP blacklisting, to the complex techniques, like anomaly-based detection and Machine Learning (ML) models. In this survey, we offer a comprehensive review of DDoS attack mitigation techniques, categorizing them into three key areas: prevention, detection, and actions after the emergence of occurrences. We look into contemporary approaches like real-time anomaly detection systems based on artificial intelligence and distributed defense framework, which seek to counter enormous system-level multi-vector DDoS attacks. Our examination also discusses the effectiveness and working issues related to technique and concentrates on high-level adaptive and scalable techniques for combating threats. Furthermore, we also provide a comparative analysis of these techniques in a tabular and graphical form with the help of figures so that an overall picture of the prevailing situation can be presented accurately. The paper concludes with directions for future research about the areas mentioned above, such as the application of decentralized security utilizing blockchain and the advancement of the integration of machine learning in order to enhance attack prediction and prevention.

Keywords
Distributed Denial of Service (DDoS), Mitigation techniques, Detection systems, Anomaly detection, Rate limiting, Machine learning, Cybersecurity.

Reference

[1] Jelena Mirkovic, and Peter Lawrence Reiher, “A Taxonomy of Ddos Attack and Ddos Defense Mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39-53, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Tao Peng, Christopher Leckie, and Kotagiri Ramamohanarao, “Survey of Network-Based Defense Mechanisms Countering the Dos and Ddos Problems,” ACM Computing Surveys (CSUR), vol. 39, no. 1, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[3] G. Carl et al., “Denial-of-Service Attack-Detection Techniques” IEEE Internet Computing, vol. 10, no. 1, pp. 82-89, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Saman Taghavi Zargar, James Joshi, and David Tipper, “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks,” IEEE Communications Surveys and Tutorials, vol. 15, no. 4, pp. 2046-2069, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Haining Wang, Danlu Zhang, and Kang G. Shin, “Detecting SYN Flooding Attacks,” Proceedings Twenty-First Annual Joint Conferences of the IEEE Computer and Communications Societies, New York, USA, vol. 3, pp. 1530-1539, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Shui Yu et al., “Traceback of DDoS Attacks Using Entropy Variations,” IEEE Transactions on Parallel and Distributed systems, vol. 22, no. 3, pp. 412-425, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[7] S. Asha Varma, and Karri Ganesh Reddy, “A Review of DDoS Attacks and its Countermeasures in Cloud Computing,” In 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, pp. 1-6, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Kriti Bhushan and B.B. Gupta, “Distributed Denial of Service (DDoS) Attack Mitigation in Software Defined Network (SDN)-Based Cloud Computing Environment,” Journal of Ambient Intelligence and Humanized Computing, vol. 10, pp. 1985-1997, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[9] DDoS Mitigation, Arcane, 2025. [Online]. Available: https://www.arcanebt.com/solutions/network-security/ddos-mitigation
[10] Iman Sharafaldin et al., “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy,” In 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, pp. 1-8, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Esraa Alomari et al., “Botnet-Based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art,” International Journal of Computer Applications, vol. 49, no. 7, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Shi Dong, Khushnood Abbas, and Raj Jain, “A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments,” IEEE Access, vol. 7, pp. 80813-80828, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Saravanan kumarasamy, and R. Asokan, “Distributed Denial of Service (DDoS) Attacks Detection Mechanism,” International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), vol. 1, no. 5, pp. 39-49, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Shweta Tripathi et al., “Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks,” Journal of Information Security, vol. 4, no. 3, pp. 150-164, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Shui Yu, Distributed Denial of Service Attack and Defense, Springer, New York, pp. 15-29, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Sanjeev Kumar, “Smurf-Based Distributed Denial of Service (DDoS) Attack Amplification in Internet,” In Second International Conference on Internet Monitoring and Protection (ICIMP 2007), San Jose, CA, USA, pp. 25-25, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Firooz B. Saghezchi et al., “Machine Learning for DDoS Attack Detection in Industry 4.0 CPPSs,” Electronics, vol. 11, no. 4, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Tasnuva Mahjabin et al., “A Survey of Distributed Denial-of-Service Attack, Prevention, and Mitigation Techniques,” International Journal of Distributed Sensor Networks, vol. 13, no. 12, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Shubhankar Chaudhary, and Pramod Kumar Mishra, “DDoS Attacks in Industrial IoT: A Survey,” Computer Networks, vol. 236, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Bryan Harris, Eli Konikoff, and Phillip Petersen, “Breaking the DDoS attack chain,” Institute for Software Research, pp. 1-16, 2013.
[Google Scholar] [Publisher Link]