Title

Analysis of Recent DDoS Attacks: an Application of Mirkovic and Peng Taxonomies

Presentation Type

Presentation

Abstract

Distributed Denial of Service (DDoS) is a threat for all companies. Every second that the company is offline, a tremendous amount of money is lost. Since the introduction of the Internet, DDoS attacks have been a common occurrence, yet solutions to counter them have been limited. This research project analyzes the recent DDoS attacks based upon the financial, societal and technical impact. Besides that, the taxonomies of Mirkovic and Peng will be used to classify details of recent DDoS attacks with the goal of identifying common characteristics. Mirkovic's taxonomy analyzes in a very technical depth the DDoS attacks meanwhile Peng's taxonomy is more generic. Both these taxonomies are quoted by several authors although nobody has used them to create a classification of attacks. This research project is useful to individuals interested in developing solutions for computer network and information security since there is no classification made or any method for classifying them.

Category

Physical Sciences

This document is currently not available here.

Share

COinS
 
Apr 17th, 9:20 AM Apr 17th, 9:40 AM

Analysis of Recent DDoS Attacks: an Application of Mirkovic and Peng Taxonomies

UC 330

Distributed Denial of Service (DDoS) is a threat for all companies. Every second that the company is offline, a tremendous amount of money is lost. Since the introduction of the Internet, DDoS attacks have been a common occurrence, yet solutions to counter them have been limited. This research project analyzes the recent DDoS attacks based upon the financial, societal and technical impact. Besides that, the taxonomies of Mirkovic and Peng will be used to classify details of recent DDoS attacks with the goal of identifying common characteristics. Mirkovic's taxonomy analyzes in a very technical depth the DDoS attacks meanwhile Peng's taxonomy is more generic. Both these taxonomies are quoted by several authors although nobody has used them to create a classification of attacks. This research project is useful to individuals interested in developing solutions for computer network and information security since there is no classification made or any method for classifying them.