Oral Presentations - Session 1C: UC 330
Analysis of Recent DDoS Attacks: an Application of Mirkovic and Peng Taxonomies
Presentation Type
Presentation
Faculty Mentor’s Full Name
Thomas Gallagher
Faculty Mentor’s Department
Applied Computing & Electronics
Abstract / Artist's Statement
Distributed Denial of Service (DDoS) is a threat for all companies. Every second that the company is offline, a tremendous amount of money is lost. Since the introduction of the Internet, DDoS attacks have been a common occurrence, yet solutions to counter them have been limited. This research project analyzes the recent DDoS attacks based upon the financial, societal and technical impact. Besides that, the taxonomies of Mirkovic and Peng will be used to classify details of recent DDoS attacks with the goal of identifying common characteristics. Mirkovic's taxonomy analyzes in a very technical depth the DDoS attacks meanwhile Peng's taxonomy is more generic. Both these taxonomies are quoted by several authors although nobody has used them to create a classification of attacks. This research project is useful to individuals interested in developing solutions for computer network and information security since there is no classification made or any method for classifying them.
Category
Physical Sciences
Analysis of Recent DDoS Attacks: an Application of Mirkovic and Peng Taxonomies
UC 330
Distributed Denial of Service (DDoS) is a threat for all companies. Every second that the company is offline, a tremendous amount of money is lost. Since the introduction of the Internet, DDoS attacks have been a common occurrence, yet solutions to counter them have been limited. This research project analyzes the recent DDoS attacks based upon the financial, societal and technical impact. Besides that, the taxonomies of Mirkovic and Peng will be used to classify details of recent DDoS attacks with the goal of identifying common characteristics. Mirkovic's taxonomy analyzes in a very technical depth the DDoS attacks meanwhile Peng's taxonomy is more generic. Both these taxonomies are quoted by several authors although nobody has used them to create a classification of attacks. This research project is useful to individuals interested in developing solutions for computer network and information security since there is no classification made or any method for classifying them.