Recent Distributed denial of service (DDoS) attacks have evolved to become a serious threat to the smooth running of both business and government applications on the Internet. Because both are dependent on web servers for their day-to-day work and transactions. A DDoS attack involves flooding a target system with internet traffic so that it is rendered unusable. The web services are either degraded or completely disrupted by DDoS attacks by sending a flood of packets in the form of legitimate looking requests towards the victim web servers. These attacks are virulent, relatively new type which effect availability of Internet services and resources. Another event which is very similar to DDoS attack is a Flash event (FE), which is an overload condition caused by a large number of legitimate requests. In this paper, an overview of DDoS & Flash event problem is given, brief detail of most recent Flash event and DDoS incidents on online organizations is highlighted.
[1] Tipton, H. F. and Krause, M., “Information Security Management Handbook”, CRC Press, 2004
[2] Criscuolo, P.J, “Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, andStacheldraht CIAC-2319”, Department of Energy computer Incident Advisory (CIAC), UCRLID-136939,Rev. 1, Lawrence Livermore
National Laboratory, February 14, 2000. http://ftp.se.kde.org/pub/security/csir/ciac/ciacdocs/ciac2319.txt.
[3] Mirkovic, J., and Reiher, P., “A Taxonomy of DDoS Attack and DDoS Defense Mechanisms,” ACMSIGCOMM Computer Communications Review, Volume 34, No. 2, pp. 39-53, April, 2004.
[4] Chen, R., Park, J., and Marchany, R., “A Divide-and-Conquer Strategy for Thwarting Distributed Denial-ofService Attacks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 18, No. 5, pp. 577-588, May 2007.
[5] Douligeris, C. and Mitrokotsa, A., “DDoS attacks and defense mechanisms: classification and state-of-the-art,” Computer Networks, Vol. 44, No. 5, pp. 643–666, April 2004.
[6] Moore, D., Shannon, C., Brown, D. J. , Voelker, G., and Savage, S., “Inferring Internet Denial-of-ServiceActivity,” ACM Transactions on Computer Systems, Vol. 24, No. 2, pp. 115–139, May 2006
[7] Handley, M., Internet Architecture WG: DoS-resistant Internet subgroup report, 2005.http://www.communications.net/object/download/1543/doc/mjhdossummary.pdf
[8] https://www.a10networks.com/blog/5-most-famous-ddos-attacks/
[9] A. Bhandari, A. L. Sangal, and K. Kumar, “Characterizing flash events and distributed denial-of-serviceattacks: an empirical investigation,” Security and Communication Networks, 2016.
[10] H.Izycka, “Flash Crowd prediction”, Vrije Universiteit Amsterdam, Master’s thesis, available at http://www.globule.org/ publi/ FCP_master2006.pdf
[11] S. Bhatia, G. Mohay, A. Tickle, and E. Ahmed,“Parametric differences between a real-world distributed denial-of-service attack and a flash event,”in Sixth IEEE International Conference on Availability, Reliability and Security (ARES’11), pp.
210–217,2011.
[12] S. Behal, K. Kumar, M. Sachdeva,” Discriminating Flash Events from DDoS Attacks:A Comprehensive Review”International Journal of Network Security, Vol.19, No.5, PP.734-741, Sept. 2017 (DOI: 10.6633/IJNS.201709.19(5).11)
[13] D. Braue, Attack on Australian Census SiteDidn’t Register on Global DDoS Sensors, Aug. 11,2016. (http://www.cso.com.au/article/604910/attack-australian-census-site)
[14] J. Jung, B. Krishnamurthy, M. Rabinovich, “Flash Crowds and Denial of Service attacks: characterization and implications for CDNs and web sites,” available at http:// www2. research.att.com/ ~bala/ papers/www02-fc.html
[15] K.M. Prasad, A.R.M. reddy, K.V. Rao, “Discriminating DDoS attack traffic from Flash Crowds on internet threat monitors (ITM) using entropy variations”, AJC & ICT, IEEE, vol.6 6 No.2, June 2013