IRJET- Distributed Denial of Service Attacks and Prevention Techniques

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 07 Issue: 09 | Sep 2020

p-ISSN: 2395-0072

www.irjet.net

Distributed Denial of Service Attacks and Prevention Techniques Mr. Vishal Ramakrishna Powar1, Ms. Pooja Subhash Naik2 1Student,

Department of Master of computer Application, Finolex Academy of Management and Technology, Maharashtra, India. 2Student, Department of Master of computer Application, Finolex Academy of Management and Technology, Maharashtra, India. ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract - As we are living in the 21 century where the internet is the main factor and security plays a vital role in it. Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by sending a large volume of requests from multiple resources. In this paper we mainly focus on DDoS attacks, and its types, and to find out best prevention and finally, we will conclude the optimum solution for DDos attack Keywords: DDoS attacks, Attacker, Victim 1. INTRODUCTION The internet in simple language is defined as an interconnected system of networks and can be used to communicate through large or small distances, share information from any place in the world, and access information or answer to almost any question instantly.

Fig -1: DDos Attack 1.2 DDos Attack

As there are various boons, there is a wide range of disadvantages for the same. As the need for the internet is rising with time, various questions related to its safety comes insight. The reason for internet insecurity is chiefly its design because the foremost concern was its functionality rather than its security and as it is easily accessible to everyone hence.

1.1.1 Volume Based Attacks (Bandwidth depletion):

1.1 DDoS

This attacker tries to occupy all the bandwidth of the victim by flooding the traffic using an excess amount of unwanted data (Sometimes 100s of Gbps).

A distributed denial-of-service (DDoS) attack is a spiteful effort to disrupt regular traffic of a fixed server service with an overflow of Internet traffic.

The attacker uses computers and systems all over the world (distributed) to send data packets to the target the victim's bandwidth to get fully occupied, and the server becomes unresponsive. This includes ICMP floods, spoofed-packet floods, and UDP floods. The magnitude measured in a bit per second.

DDoS attacks accomplish efficiency by utilizing multiple compromised computer systems as sources of attack traffic. Machines can contain computers and other networked resources such as IoT devices.

Š 2020, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 2569


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.