Application Layer Denial-of-Service Attacks and Defense Mechanisms

2021 ◽  
Vol 54 (4) ◽  
pp. 1-33
Author(s):  
Nikhil Tripathi ◽  
Neminath Hubballi

Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities of the protocol implementation or its design. Unlike volumetric DoS attacks, these are stealthy in nature and target a specific application running on the victim. There are several attacks discovered against popular application layer protocols in recent years. In this article, we provide a structured and comprehensive survey of the existing application layer DoS attacks and defense mechanisms. We classify existing attacks and defense mechanisms into different categories, describe their working, and compare them based on relevant parameters. We conclude the article with directions for future research.

Author(s):  
Lawan A. Mohammed ◽  
Biju Issac

This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the various vulnerabilities that are present with such networks. Along with other security vulnerabilities, defense against denial of service attacks is a critical component of any security system. Unlike wired networks where denial of service attacks has been extensively studied, there is a lack of research for preventing such attacks in wireless networks. In addition to various vulnerabilities, some factors leading to different types of denial of service (DoS) attacks and some defense mechanisms are discussed in this chapter. This can help to better understand the wireless network vulnerabilities and subsequently more techniques and procedures to combat these attacks may be developed by researchers.


2011 ◽  
pp. 1364-1378
Author(s):  
Aikaterini Mitrokotsa ◽  
Christos Douligeris

The use of electronic technologies in government services has played a significant role in making citizens’ lives more convenient. Even though the transition to digital governance has great advantages for the quality of government services it may be accompanied with many security threats. One of the major threats and hardest security problems e-Government faces are the Denial of Service (DoS) attacks. DoS attacks have already taken some of the most popular e-government sites off-line for several hours causing enormous losses and repair costs. In this chapter, important incidents of DoS attacks and results from surveys that indicate the seriousness of the problem are presented. In order to limit the problem of DoS attacks in government organisations we also present a list of best practices that can be used to combat the problem together with a classification of attacks and defense mechanisms.


2020 ◽  
Vol 32 (3) ◽  
pp. 15-22
Author(s):  
Sukhpal Singh Gill ◽  
Arash Shaghaghi

Cloud computing has emerged as a dominant platform for computing for the foreseeable future. A key factor in the adoption of this technology is its security and reliability. Here, this article addresses a key challenge which is the secure allocation of resources. The authors propose a security-based resource allocation model for execution of cloud workloads called STARK. The solution is designed to ensure security against probing, User to Root (U2R), Remote to Local (R2L) and Denial of Service (DoS) attacks whilst the execution of heterogeneous cloud workloads. Further, this paper highlights the promising directions for future research.


2015 ◽  
Vol 7 (2/3/4) ◽  
pp. 216 ◽  
Author(s):  
Georgios Mantas ◽  
Natalia Stakhanova ◽  
Hugo Gonzalez ◽  
Hossein Hadian Jazi ◽  
Ali A. Ghorbani

2004 ◽  
Vol 23 (8) ◽  
pp. 665-678 ◽  
Author(s):  
Li-Chiou Chen ◽  
Thomas A. Longstaff ◽  
Kathleen M. Carley

2014 ◽  
pp. 95-104
Author(s):  
Andrian Piskozub

The aim of this paper is to understand reasons why denial of service (DoS) attacks are happening; to find ways how to avoid these attacks or lessen their influence; to work out strategy of detecting and preventing these attacks.


2021 ◽  
Vol 7 (1) ◽  
pp. 16
Author(s):  
Álvaro Michelena ◽  
Francisco Zayas-Gato ◽  
Esteban Jove ◽  
José Luis Calvo-Rolle

The present work deals with the problem of detecting Denial of Service attacks in an IoT environment. To achieve this goal, a dataset registered in an MQTT protocol network is used, applying dimension reduction techniques combined with classification algorithms. The final classifiers presents successful results.


2017 ◽  
Author(s):  
Michele De Donno ◽  
Nicola Dragoni ◽  
Alberto Giaretta ◽  
Manuel Mazzara

The 2016 is remembered as the year that showed to the world how dangerous distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DoS attacks perpetrated through IoT devices.


Sign in / Sign up

Export Citation Format

Share Document