Distributed reflection denial of service attack: A critical review
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of...
Saved in:
Published in | International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering Vol. 11; no. 6; p. 5327 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Yogyakarta
IAES Institute of Advanced Engineering and Science
01.12.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 2088-8708 2722-256X 2722-2578 2722-2578 2088-8708 |
DOI | 10.11591/ijece.v11i6.pp5327-5341 |
Cover
Abstract | As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks. |
---|---|
AbstractList | As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks. |
Author | Manickam, Selvakumar Alsaeedi, Ali Hakem Nuiaa, Riyadh Rahef |
Author_xml | – sequence: 1 givenname: Riyadh Rahef surname: Nuiaa fullname: Nuiaa, Riyadh Rahef – sequence: 2 givenname: Selvakumar surname: Manickam fullname: Manickam, Selvakumar – sequence: 3 givenname: Ali Hakem surname: Alsaeedi fullname: Alsaeedi, Ali Hakem |
BookMark | eNqVkEtLAzEUhYMoWGv_Q8D11CQzeYwLodYnFNzoOiRpAqnjzJhkWvrvTTuu3Iire-Gec-7huwCnbddaACBGc4xpja_9xho732Ls2bzvaUl4QcsKn4AJ4YQUhHJxmnckRCE4EudgFqPXqKp4hTijE3B372MKXg_JrmGwrrEm-a6Fa9t61cDOwWjD1hsLVUrKfNzABTTBJ2_yNditt7tLcOZUE-3sZ07B--PD2_K5WL0-vSwXq8IQSnChuXYMUeycsxRRQrRiRhtic2lcaqprURJNRLlmRAtMlKoxNqbWzCHDs2wK6jF3aHu136mmkX3wnyrsJUbyyEMeecgjDznykAce2Xs1evvQfQ02JrnphtDmupIwhmtWk4pllRhVJnQxZhr_eXD7y2p8UgeUKSjf_B3wDRPojAQ |
CitedBy_id | crossref_primary_10_31185_wjcm_94 crossref_primary_10_1109_ACCESS_2025_3535943 |
ContentType | Journal Article |
Copyright | Copyright IAES Institute of Advanced Engineering and Science Dec 2021 |
Copyright_xml | – notice: Copyright IAES Institute of Advanced Engineering and Science Dec 2021 |
DBID | AAYXX CITATION 8FE 8FG ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ BVBZV CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS ADTOC UNPAY |
DOI | 10.11591/ijece.v11i6.pp5327-5341 |
DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection East & South Asia Database (ProQuest) ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection Unpaywall for CDI: Periodical Content Unpaywall |
DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection East & South Asia Database Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Computer Science Database CrossRef |
Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2722-2578 2088-8708 |
ExternalDocumentID | 10.11591/ijece.v11i6.pp5327-5341 10_11591_ijece_v11i6_pp5327_5341 |
GroupedDBID | .4S .DC 8FE 8FG AAKDD AAYXX ABJCF ABUWG AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS BENPR BGLVJ BPHCQ BVBZV CCPQU CITATION EOJEC HCIFZ I-F K6V K7- KWQ L6V M7S OBODZ OK1 P62 PHGZM PHGZT PQGLB PQQKQ PROAC PTHSS PUEGO TUS AZQEC DWQXO GNUQQ JQ2 PKEHL PQEST PQUKI PRINS ADTOC M~E UNPAY |
ID | FETCH-LOGICAL-c2521-b7bf6051fffe50522ba6cbc2e32713b5b9832b283d62b812aa911cc9b6f0c72e3 |
IEDL.DBID | UNPAY |
ISSN | 2088-8708 2722-256X 2722-2578 |
IngestDate | Wed Oct 01 15:08:43 EDT 2025 Fri Jul 25 11:59:50 EDT 2025 Wed Oct 01 02:05:26 EDT 2025 Thu Apr 24 23:01:29 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 6 |
Language | English |
License | http://creativecommons.org/licenses/by-sa/4.0 cc-by-sa |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2521-b7bf6051fffe50522ba6cbc2e32713b5b9832b283d62b812aa911cc9b6f0c72e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=http://ijece.iaescore.com/index.php/IJECE/article/download/25629/15249 |
PQID | 2661969246 |
PQPubID | 1686344 |
ParticipantIDs | unpaywall_primary_10_11591_ijece_v11i6_pp5327_5341 proquest_journals_2661969246 crossref_primary_10_11591_ijece_v11i6_pp5327_5341 crossref_citationtrail_10_11591_ijece_v11i6_pp5327_5341 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-12-01 20211201 |
PublicationDateYYYYMMDD | 2021-12-01 |
PublicationDate_xml | – month: 12 year: 2021 text: 2021-12-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Yogyakarta |
PublicationPlace_xml | – name: Yogyakarta |
PublicationTitle | International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering |
PublicationYear | 2021 |
Publisher | IAES Institute of Advanced Engineering and Science |
Publisher_xml | – name: IAES Institute of Advanced Engineering and Science |
SSID | ssib044740765 ssj0000866295 |
Score | 2.3275049 |
SecondaryResourceType | review_article |
Snippet | As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a... |
SourceID | unpaywall proquest crossref |
SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database |
StartPage | 5327 |
SubjectTerms | Denial of service attacks Internet TCP (protocol) |
SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagDMCAeIpCQR5Y0zaO7SgsqDxKhQQTlbpZtmNLhSgNNAXx7zkn7oMFdctgW8ln--4753wfQlddcGrMhSUMXjMAf0uCJDUSnmisIqUJVe5y8vMLHwzp04iN_IHb1KdVzm1iZajTiXZn5B3nSBIO0QK_KT4Cpxrl_q56CY1NtBUSWEnupnj_cXHGAnSdk4TNE3hYEnbGb0ab9lcYjnm7KFhE4oBFNPzrlZZUc3uWF_LnW2bZitfp76M9Txdxr57fA7Rh8kO0u1JE8Ajd3rvat062yqQYRs6q5Kocpy6NLsMTi6e1PcCyLKV-v8Y9rL3AAa5vrhyjYf_h9W4QeGWEQBPwt4GKlYU4JLTWGqdER5TkGoA18D1hpJhKYKMqYA4pJwpcuJRg07ROFLddHUOzE9TIJ7k5RVhD4xg4mKJG0TTqKqdCRqnVFrhZImUTxXNkhPZlw516RSaq8AEwFRWmosJU1JgKh2kThYueRV06Y40-rTn4wm-mqVhOfRORxYSsPebZ_2Oeox3i8lSqFJUWapSfM3MBRKNUl9Vq-gWZXNHN priority: 102 providerName: ProQuest |
Title | Distributed reflection denial of service attack: A critical review |
URI | https://www.proquest.com/docview/2661969246 http://ijece.iaescore.com/index.php/IJECE/article/download/25629/15249 |
UnpaywallVersion | publishedVersion |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2722-2578 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044740765 issn: 2722-2578 databaseCode: M~E dateStart: 20110101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: East & South Asia Database customDbUrl: eissn: 2722-2578 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000866295 issn: 2088-8708 databaseCode: BVBZV dateStart: 20110901 isFulltext: true titleUrlDefault: https://search.proquest.com/eastsouthasia providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2722-2578 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000866295 issn: 2088-8708 databaseCode: BENPR dateStart: 20110901 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 2722-2578 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000866295 issn: 2088-8708 databaseCode: 8FG dateStart: 20110901 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1JS8NAFH5oe_DkgoqVWubgNU2TTCaNt6qpWmgRsVBPYWYykdqQFpsqevC3-yaLC15EbxN4k-V9yVvIzPcBHHcwqbm6LXHxNg3Mt7bhR4rjiHrCEdKmQm9OHo7Y5ZgOJu5kDSr9zumDkqo95WpZkDhipM5ZAzVVhHk1CM4Cs_SoGWky-TmPTEzatm9iHqL-OtSZ_tFUg_p4dN2708pyHnZbaDL5HHvdakmP61vlJZ8sa8rai4Xr2J7hOtT6nqc-i8-NVbrgL888Sb7kof4W3Fe7eYrlJ7P2KhNt-fqT3PGfj7gNm2WpSnqF2Q6sqXQXTs81064WyVIRwbtO8qVcKYn0or2EzGOyLKIP4VnG5eyE9Igs5RRIsU9mD8b94Pbs0ih1GAxpY3Y3hCdi7HqsOI6V1r2zBWcSYVToK8sRrvAxLAisUyJmCywYOMcIKqUvWNyRHprtQy2dp-oAiERjBIEJqgSNnI7QmmeUxjLGStDnvAFe5fVQliTlWisjCfNmBfEKc_-FOV5hgVeo8WqA9TFzURB1_GJOswI2LD_dZagrFp9hW8oaYH-A_etzHv5lUhNq2eNKHWF9k4kWrHf7Fy2onwaj6xs8Gr4FrfKFfgensP22 |
linkProvider | Unpaywall |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB1BOQAHxCrK6gMc0zaOkxAkhNhKWU9U6s3YjiMVojTQAOKn-EbGWVq4oF645WBPrOfJLM54HsBeC52aa9ISF5dpob-lVhBqgU_Ml45UlElzOfnu3ut02XXP7U3BV3UXxpRVVjYxN9ThQJkz8qZxJIGH2YJ3nL5YhjXK_F2tKDQKtbjRnx-Ysg2Prs5xf_cpbV88nHWsklXAUhR9lSV9GWEMb0dRpA2LG5XCU7go7VBM2KQrA1RyiV439KhE9ycE2gOlAulFLeXjMJQ7DTPMcRzTq_-gfTk608H0wKOBWxUMuYHd7D9ppRvvtt33Gmnq4jss12H2by84Dm1n35JUfH6IOP7h5dqLsFCGp-Sk0KclmNLJMsz_aFq4AqfnpteuocnSIUHJcV7MlZDQlO3FZBCRYWF_iMgyoZ4PyQlRJaECKW7KrEL3XzBbg1oySPQ6EIWDfYz5JNOShU5LGtYzxiIVYSwYCFEHv0KGq7JNuWHLiHmeriCmPMeU55jyAlNuMK2DPZqZFq06JpizVYHPy493yMeqVgc62pCJZW78LXMXZjsPd7f89ur-ZhPmqKmRyctjtqCWvb7pbQxyMrmTaxaBx_9W5W--1Q6E |
linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PT8IwFG4QDp78ETVi0PTgdRvbus56Q4QgicSDJHha2q4zyDKIDI3-9b5uHWi8EL318Lp179v63stevw-hyzYEtUCXJQEs04J461ksVhxGJBS-kB4R-nDy_YgOxmQ4CSY1VOl3Tl-UVPaUq2VJ4gg7dcEaqKkinLthr9tzjEedWJPJz3nsQND2mANxiLAd1KD6R1MdNcajh86TVpYLodoCk8lmHF5VLT0Bc80t31x3Su3FIvC90Ap84v6MU5vkc3eVLfjHO0_Tb3Gov4-eq9M8ZfvJzF7lwpafv8kd__mIB2jPpKq4U5odoprKjtDNrWba1SJZKsaw6rRo5cpwrJv2UjxP8LLcfTDPcy5n17iDpZFTwOU5mWM07vceuwPL6DBY0oPobolQJFD1uEmSKK175wlOJcCowFeuLwLBYFsQkKfE1BOQMHAOO6iUTNCkLUMwO0H1bJ6pU4QlGAMIVBAlSOy3hdY8IySRCWSCjPMmCiuvR9KQlGutjDQqihXAKyr8FxV4RSVekcaridz1zEVJ1LHFnFYFbGQ-3WWkMxZGoSylTeStwd76mmd_mdRC9fx1pc4hv8nFhXl5vwABzPoF |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Distributed+reflection+denial+of+service+attack%3A+A+critical+review&rft.jtitle=International+journal+of+electrical+and+computer+engineering+%28Malacca%2C+Malacca%29&rft.au=Nuiaa%2C+Riyadh+Rahef&rft.au=Manickam%2C+Selvakumar&rft.au=Alsaeedi%2C+Ali+Hakem&rft.date=2021-12-01&rft.issn=2088-8708&rft.eissn=2722-2578&rft.volume=11&rft.issue=6&rft.spage=5327&rft_id=info:doi/10.11591%2Fijece.v11i6.pp5327-5341&rft.externalDBID=n%2Fa&rft.externalDocID=10_11591_ijece_v11i6_pp5327_5341 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2088-8708&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2088-8708&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2088-8708&client=summon |