Research Summarization of DDoS

HOU Jun,LI Qian-mu,ZHANG Hong
DOI: https://doi.org/10.3969/j.issn.1009-7902.2006.06.018
2006-01-01
Abstract:Distributed denial-of-service(DDoS) attacks present an immense threat to the Internet.They engage the power of a vast number of coordinated Internet hosts to consume some critical resource at the target and deny the service to legitimate clients.As a side effect,they frequently create network congestion on the way from a source to the target,thus disrupting normal Internet operation.The existing security mechanisms do not provide effective defense against these attacks.A large number of attacking machines and the use of source IP address spoofing make the trace back impossible.The use of legitimate packets for the attack and the varying of packet fields disable characterization and filtering of the attack streams.This paper analyzes the principle of DDoS attacks and typical attack types,researches into two detection models and proposes a detection model.Several kinds of technology of data mining are introduced,some data mining arithmetic compared and some problems to be resolved are proposed accordingly.
What problem does this paper attempt to address?