Next Article in Journal
Emotion Recognition from Speech Using the Bag-of-Visual Words on Audio Segment Spectrograms
Next Article in Special Issue
A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
Previous Article in Journal
Sign Language Technologies and the Critical Role of SL Resources in View of Future Internet Accessibility Services
Previous Article in Special Issue
Adapting Engineering Education to Industry 4.0 Vision
Article Menu
Issue 1 (March) cover image

Export Article

Open AccessReview

On Distributed Denial of Service Current Defense Schemes

1
Department of Computer Engineering, Kwame Nkrumah University of Science and Technology (KNUST), PMB, Kumasi, Ghana
2
Department of Electrical Engineering, Kwame Nkrumah University of Science and Technology (KNUST), PMB, Kumasi, Ghana
*
Author to whom correspondence should be addressed.
Technologies 2019, 7(1), 19; https://doi.org/10.3390/technologies7010019
Received: 20 December 2018 / Revised: 15 January 2019 / Accepted: 16 January 2019 / Published: 30 January 2019
(This article belongs to the Special Issue Technologies for Industry 4.0)
  |  
PDF [3277 KB, uploaded 30 January 2019]
  |  

Abstract

Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attackers coordinate to launch an attack on one victim. Moreover, attackers these days do not need to be highly skilled to perpetrate an attack. Tools for orchestrating an attack can easily be found online and require little to no knowledge about attack scripts to initiate an attack. Studies have been done severally to develop defense mechanisms to detect and defend against DDoS attacks. As defense schemes are designed and developed, attackers are also on the move to evade these defense mechanisms and so there is a need for a continual study in developing defense mechanisms. This paper discusses the current DDoS defense mechanisms, their strengths and weaknesses. View Full-Text
Keywords: distributed denial of service (DDoS); detection; defense; traceback; attack distributed denial of service (DDoS); detection; defense; traceback; attack
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Kotey, S.D.; Tchao, E.T.; Gadze, J.D. On Distributed Denial of Service Current Defense Schemes. Technologies 2019, 7, 19.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Technologies EISSN 2227-7080 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top