Distributed reflection denial of service attack: A critical review

As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering Vol. 11; no. 6; p. 5327
Main Authors Nuiaa, Riyadh Rahef, Manickam, Selvakumar, Alsaeedi, Ali Hakem
Format Journal Article
LanguageEnglish
Published Yogyakarta IAES Institute of Advanced Engineering and Science 01.12.2021
Subjects
Online AccessGet full text
ISSN2088-8708
2722-256X
2722-2578
2722-2578
2088-8708
DOI10.11591/ijece.v11i6.pp5327-5341

Cover

More Information
Summary:As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2088-8708
2722-256X
2722-2578
2722-2578
2088-8708
DOI:10.11591/ijece.v11i6.pp5327-5341