Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense

Distributed Denial of Service attacks are exercised by attackers in various forms. These attacks vary from single attacking source to a networked attacking infrastructure. They also vary in degree of automation, from manual efforts to fully automated attacks. In networked form, a botnet of attacking sources is created. These machines are vulnerable on internet and attackers exploit their vulnerabilities to control them for generating attacks against a victim. These compromised machines are called 'Zombies'. Moreover, there are many automated tools available to generate DDoS attacks.

Provided by: mecs-press Topic: Security Date Added: Jul 2013 Format: PDF

Find By Topic