Author:
Nuiaa Riyadh Rahef,Manickam Selvakumar,Alsaeedi Ali Hakem
Abstract
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
Publisher
Institute of Advanced Engineering and Science
Subject
Electrical and Electronic Engineering,General Computer Science
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Patch Pilgrimage: Exploring the Landscape of TCP Reflective Attacks and User Patching Expedition;Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing;2024-04-08
2. A critical review of Optimization MANET routing protocols;Wasit Journal of Computer and Mathematics Science;2022-12-30
3. A Literature Review of the Seriousness of Flooding-based DoS Attack;2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT);2022-11-20
4. Internet of Things: Security and Solutions Survey;Sensors;2022-09-30
5. Node Protection using Hiding Identity for IPv6 Based Network;2022 Muthanna International Conference on Engineering Science and Technology (MICEST);2022-03-16