Distributed Denial of Service (DDoS) attacks are becoming more

frequent and the size of these attacks is increasing rapidly on every

year. This increases the load on the networks of Internet Service

Providers (ISPs) and many Cloud computing providers. Cloud

computing is an emerging technology and adopted by many Cloud

providers. But, there are many issues and one of them is Distributed

Denial of Service(DDOS). Distributed Denial of Service (DDoS) attack

is the most prominent attacks in this area of computing. DDoS is the

single largest threat to internet and internet of things. The frequency

and sophistication of Distributed Denial of Service attacks (DDoS)

on the Internet are rapidly increasing. In this article, we conduct an

up-to-date review of essential Cloud Network threats and present

a methodology for evaluation of existing security proposals. Based

on this, we introduce a comprehensive and up-to-date survey of

proposals intended to make the Network Infrastructure highly

secure and introducing new methods for detection and mitigation

of routing instabilities and these generic countermeasure model

can be used to prevent secondary victims and to prevent DDoS

attacks. These taxonomies define varies similarities and different

patterns in Dos and DDoS attacks, configuration, functional tools, to

assist in further improvement on Network Infrastructure security and

proposed a solution to countering DDoS attacks.

D- DoS attacks can be classified further as the primary target is

to congest the network with a massive amount of the bandwidth

Utilization and it could cause the network abruption to the victim

network.

Image for post

Attack Classifications: (Figure 1) Besides, these classifications, all

forms of attacks fall under these two functions.

Connection-based attack: This type of attacks can be carried out

through an established connection of any client and server by using

certain connection-oriented protocols.

Connection-less attack: An attack that doesn’t require a standard

protocol-based session. Connection-less meant to be formally

established before a server can send the “data packets” — typically a

basic unit of communication information which is transferred over a

digital network to a client.

**Volumetric Attack: **The Specific goal of this type of attack is to

cause the congestion traffic while sending the data packets over the

line and it would cause a bandwidth to overwhelm the scenario. Especially,

most of the attacks are executed using botnets. botnet is a group of

agent handlers in a DDoS attack which provides the attacker with the

ability to wage a much larger and more wild attack than a DoS attack

while remaining anonymous on the Internet. It is measured by the

number of received bits per second (bps).

Protocol Attack: In general, this type of attack focal point is

on actual web/DNS/FTP servers, core Routers and switch, firewall

devices and LB (load balancers) to disrupt the well-established

connections, and also causing the exhaustion of their limited number

of concurrent sessions on the device. It is measured by the number of

received packets per second (PPS).

Application Layer Attack: It is also known as Connection-oriented

attacks. Application attacks occur in the Layer 7 of an OSI Model.

Most of the Applications are under vulnerable scenarios by consisting

of many loopholes. This specific type of attack is pretty much hard to

detect because these sophisticated threats are generated from the

limited number of attack machines, on top of that it’s only generating

low traffic rate which appears to be legitimate for the victim to realize.

It is measured by the number of received requests per second (RPS).

#technology #security #cloud-computing #computer-sciecne #ddos-attack #cloud

What is DDoS attack ?
1.35 GEEK