Selective DDoS Attacks in Application server and Wireless Network – Survey

Authors

  • Kaur H Chandigarh Engineering College, India
  • Kaur B Chandigarh Engineering College, India

Keywords:

DDos Attack, wireless Sensor Network, CERT coordination Centre, protocol attack and logical attack

Abstract

In the current computer world, preserving the information is very difficult. Some interrupts can occur on the local organization or network based system. Without security measures and controls in place our data might be subjected to an attack .Now a day’s numerous attacks are evolve. The Dos attack is the most popular attack in network and internet.This kind of attack ingests a large amount of network bandwidth and occupies network equipment resources by flooding them with packet from the machinesdispersed all over the world. Dos attacks are usually doing by following methods: 1) Send unlimited quantity of packets to the server.2) Implementing malwares.3) Teardrop attack.4) Application level flood. A DDos attack is propelled by a mechanism called Botnet through a network of controlled computers. Distributed denial of service (DDos) attack has been regularly in the works attacks that badly intimidate the stability of the internet. In accordance to CERT coordination center, there are mainly three categories of DDoS attacks: flood attacks, protocol attack and logical attack.

References

Thapngam, Theerasak, et al. "Discriminating DDoS attack traffic from flash crowd through packet arrival patterns." Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on. IEEE, 2011.

Jun, Jae-Hyun, Hyunju Oh, and Sung-Ho Kim. "DDoS flooding attack detection through a step-by-step investigation." Networked Embedded Systems for Enterprise Applications (NESEA), 2011 IEEE 2nd International Conference on. IEEE, 2011.

Han, Young-Tae, et al. "Vulnerability of small networks for the TTL expiry DDoS attack." Computing, Communications and Applications Conference (ComComAp), 2012. IEEE, 2012.

SoundarRajam, V. K., et al. "Autonomous system based traceback mechanism for DDoS attack." Advanced Computing (ICoAC), 2013 Fifth International Conference on. IEEE, 2013.

Sanmorino, Ahmad, and SetiadiYazid. "Ddos attack detection method and mitigation using pattern of the flow." Information and Communication Technology (ICoICT), 2013 International Conference of. IEEE, 2013.

Bhuyan, Monowar H., Dhruba Kumar Bhattacharyya, and Jugal Kumar Kalita. "Information metrics for low-rate DDoS attack detection: A comparative evaluation." Contemporary Computing (IC3), 2014 Seventh International Conference on. IEEE, 2014.

Anantvalee, Tiranuch, and Jie Wu. "A survey on intrusion detection in mobile ad hoc networks." Wireless Network Security. Springer US, 2007. 159-180.

Chhabra, Meghna, and B. B. Gupta. "An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET)." Research Journal of Applied Sciences, Engineering and Technology 7.10 (2014): 2033-2039.

Alqahtani, Sarra, and Rose Gamble. "DDoS Attacks in Service Clouds."System Sciences (HICSS), 2015 48th Hawaii International Conference on. IEEE, 2015.

Jae-Hyun Jun, Hyunju Oh, andSung Kim. "Real time detection and classification of DDoS attacks using Enhanced SVM with string kernels." Recent Trends in Information Technology (ICRTIT), 2015 International journals on. IEEE, 2015.

Downloads

Published

2025-11-11

How to Cite

[1]
H. Kaur and B. Kaur, “Selective DDoS Attacks in Application server and Wireless Network – Survey”, Int. J. Comp. Sci. Eng., vol. 4, no. 8, pp. 78–80, Nov. 2025.

Issue

Section

Review Article