Distributed Denial of Service (DDoS): A History

Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early Internet, DDoS attacks have persisted. This article presents the techn...

Full description

Saved in:
Bibliographic Details
Published inIEEE annals of the history of computing Vol. 44; no. 2; pp. 44 - 54
Main Authors Brooks, Richard R., Yu, Lu, Ozcelik, Ilker, Oakley, Jon, Tusing, Nathan
Format Journal Article
LanguageEnglish
Published Washington IEEE 01.04.2022
IEEE Computer Society
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1058-6180
1934-1547
DOI10.1109/MAHC.2021.3072582

Cover

More Information
Summary:Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early Internet, DDoS attacks have persisted. This article presents the technologies and tools that are used in DDoS, followed by a timeline of the major DDoS incidents. This is followed by a discussion of the primary classes of DDoS incidents and how the computing ecosystem enables DDoS. Early attacks were related to hacker culture, but their focus quickly changed to commercial exploitation. There have also been a number of political uses of DDoS, including cyberwar, hacktivism, and terrorism.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1058-6180
1934-1547
DOI:10.1109/MAHC.2021.3072582