Browse > Article
http://dx.doi.org/10.14400/JDPM.2014.12.1.423

Analysis of DDoS Attack and Countermeasure: Survey  

Hong, Sunghyuck (Baekseok University, Division of Information and Communication)
Publication Information
Journal of Digital Convergence / v.12, no.1, 2014 , pp. 423-429 More about this Journal
Abstract
DDoS attacks is upgrade of DoS attacks. Botnet is being used by DDoS attack, so it is able to attack a millions of PCs at one time. DDoS attacks find the root the cause of the attack because it is hard to find sources for it, even after the treatment wavelength serious social problem in this study, the analysis and countermeasures for DDoS attack is presented.
Keywords
Packet attack detection; route security; Distributed denial of service; DDoS detection algorithm; Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Michael O'neil, "Unix System in a Large Enterprise Environment-Axent Esm", SANS Institute Information Security Reading Room, June 22, 2001.
2 Mara C. FERNANDEZ, Ernestina MENASALVAS, Oscar MARBAN, Jose MM PENA, Socorro MILLAN, "MINIMAL DECISION RULES BASED ON THE APRIORI ALGORITHM", Int. J. Appl. Math Computer. Sci Vol.11, No.3, pp. 681-704, 2001.
3 W.ahn, "EAR: An Energy-Aware Block Reallocation Framework for Energy Efficiency", Proc. of ICCS - LNCS 4490, pp. 941-948, 2007.
4 R. Chandramouli, S. Bapatla, and K. Subbalakshmi, "Battery Power-Aware Encryption", ACM Tr. Info and System Security, Vol 9 No. 2 pp. 162-180, 2006.   DOI
5 P. Prasithsanaree and P. Krishnamurthy, "on a Framework for Energy-Efficient Security Protocols in Wireless Networks", Computer Communcations, Vol. 27, pp. 1716-1729, 2004.
6 W. Zeng, H. Yu, and C. Lin, Multimedia Security Technologies for Digital Rights Management, Academic Press, 2006.
7 T. Maples and G. Spanos, "Performance Study of Selective Encryption Scheme for the Security of Networked Real-Time Video", Proc. of ICCCN, pp. 2-10, 1995.
8 F. Liu and H. Koenig. "A Novel Encryption Algorithm for High Resolution Video", Proc. of NOSSDAV, pp. 69-74, 2005.
9 B. Bhargava, C. Shi, and S. Wang, "MPEG Video Encryption Algorithms", Multimedia Tools and Applications, Vol. 24, pp. 57-79, 2004.   DOI   ScienceOn