Reference Hub2
Denial-of-Service and Botnet Analysis, Detection, and Mitigation

Denial-of-Service and Botnet Analysis, Detection, and Mitigation

Sobana Sikkanan, Kasthuri M.
ISBN13: 9781522595540|ISBN10: 1522595546|ISBN13 Softcover: 9781522595557|EISBN13: 9781522595564
DOI: 10.4018/978-1-5225-9554-0.ch005
Cite Chapter Cite Chapter

MLA

Sikkanan, Sobana, and Kasthuri M. "Denial-of-Service and Botnet Analysis, Detection, and Mitigation." Forensic Investigations and Risk Management in Mobile and Wireless Communications, edited by Kavita Sharma, et al., IGI Global, 2020, pp. 114-151. https://doi.org/10.4018/978-1-5225-9554-0.ch005

APA

Sikkanan, S. & Kasthuri M. (2020). Denial-of-Service and Botnet Analysis, Detection, and Mitigation. In K. Sharma, M. Makino, G. Shrivastava, & B. Agarwal (Eds.), Forensic Investigations and Risk Management in Mobile and Wireless Communications (pp. 114-151). IGI Global. https://doi.org/10.4018/978-1-5225-9554-0.ch005

Chicago

Sikkanan, Sobana, and Kasthuri M. "Denial-of-Service and Botnet Analysis, Detection, and Mitigation." In Forensic Investigations and Risk Management in Mobile and Wireless Communications, edited by Kavita Sharma, et al., 114-151. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9554-0.ch005

Export Reference

Mendeley
Favorite

Abstract

The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.