DOI QR코드

DOI QR Code

A STUDY OF DISTRIBUTED DENIAL OF SERVICE ATTACK ON GOVERNMENT INFRASTRUCTURE

  • Kim, Suk-Jin (Center for Advanced Image and Information Technology School of Electronics & Information Engineering ChonBuk National University) ;
  • Jeong, Gisung (Department of Fire Service Administration, WonKwang University)
  • Received : 2016.03.03
  • Accepted : 2016.04.02
  • Published : 2016.05.31

Abstract

Distributed Denial of service attack is one of the major threats nowadays especially to the government infrastructure that give huge impact to the reputation and interrupt the services and resource. Our survey start with brief introduction about DDoS attacks, we illustrate the trends and incident happened at government from various countries. We then provide an extensive literature review on the existing research about implication, types of attacks and initiative to defence against the DDoS attacks. Our discussion aims to identify the trends in DDoS attacks, in depth impact of DDoS attacks to government infrastructure, classification of attacks and techniques against the attacks. And we will use for a fire fight safety and management.

Keywords

References

  1. Georgio Loukas and Gulay Oke, "Protection Against Denial of Service Attacks: A Survey," 2002.
  2. Howard F. Lipson, "Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues," 2002 .
  3. Jason Smith, " Denial of Services :Prevention, Modelling and Detection", 2007.
  4. K.Omirston and MM Elof , "Denial-of-Service and Deistributed-Denial-Of-Service On The Internet," .
  5. Fan Lin, Wenhua Zeng and Yi Jiang, "A Cloud Tracing and Filtering Framework for Defensing Against Denial of Service Attacks," International Journal of Digital Content technology and its Apllication, vol. 4, Number 9, December 2010.
  6. Darren Anstee, "DDoS Attack Trends Through 2010, Infrastructure Security Report and ATLAS Initiatives," 2011.
  7. R.Benjamin, B.Gladman and B.Randell, "Protecting IT System from Cyber Crime,"The Computer Journal,Volume 41,Number 7,1998.
  8. Oleksii Ignatenko , "Denial of Service Attack in the Internet: Agent-Based Intrusion Detection and Reaction," 1999.
  9. S.S Nagamuthu Krishnan and Dr. V. Saravanan, "DDoS Defense Mechanism by applying stamps," IJCSNS,Vol.9, No.8, 2009.
  10. Mary Barifield, "Hackers Attack Japan Government and Mitsubishi," http://threednews.com , September 21 2011.
  11. Dan Goodin, "DDOS Attacks Topple 40 Swedish Sites," http://www.theregister.co.uk, October 2009.
  12. John Leyden, "Swedish spooks knocked offline by hack attack," http://www.theregister.co.uk, November 2009.
  13. John Leyden, "South Korea Blitzed by DDOSers," http://www.theregister.co.uk, 4 Mac 2011.
  14. "DDOS Attacks in Q2 2011," http://www.securelist.com," 29 August 2011.
  15. Darren Anstee, "DDOS Attack Trends Through 2010 Infrastructure Security Report and ATLAS Initiative," Arbor Networks Worldwide Infrastructure Security Report, Volume VI.
  16. Patrick Chang and Lori Mac Vittie, "The Fundamentals of HTTP," F5 White Paper,2008.
  17. Incognito Software, "Understanding DNS (The Domain Name System," January 2007.
  18. Focus Editor, "Top 10 U.S Government Web Break-Ins of All Time," http://www.focus.com.
  19. Infosecurity.com, "South Korean Government agencies hit by DDOS Attacks," http://www.infosecurity-magazine.com, 4 March 2011.
  20. "Anonymous Group Hits Malaysian Government Hard With DDOS Attacks", http://dos-attacks.com, 16 Jun 2011.
  21. CS3.Inc, "Defending Government Network Infrastructure against Distributed Denial of Service Attacks," October 2002.
  22. Frank TSE, "What is DDOS and Mitigation Strategies," Nexusguard.
  23. Stewart Baker, Shaun Waterman and George Ivanov, "In The Crossfire Critical Infrastructure in the Age of cyber War," McAffee, 2009.
  24. Wikepedia, "Infrastructure," http://en.wikipedia.org/wiki/Infrastructure.
  25. William A. Niskanen , "The Soft Infrastructure of a Market Economy," Cato Journal, p. 233-238.
  26. X.Wang and M.K.Reiter, "NADIR: an automated system for detecting network intrusions and misuseDefending Against Denial-of-Service Attacks with Puzzle Actions," In Proceedings of the 2003 IEEE Symposium on Security and Privacy Security. IEEE Computer Society, 2003.
  27. S.Savage, D.Wetherall, A.Karlin and T.Anderson, "Practical Network Support for IP Traceback," IEEE/ACM Transactions on Networking (TON).
  28. Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica, "Towards a More Functional and Secure Network Infrastructure ,".
  29. Hang Chau, "Network Security-Defense Against DOS/DDOS Attacks,".
  30. Hangzhou H3C Technologies Co.Ltd, "Attack Prevention Technology White Paper,".
  31. Vebjorn Moen, Andre N. Klingsheim, Kent Inge Fagerland Simonsen, and Kjell Jorgen Hole," Vulnerabilities in E-Government,".
  32. CNN. Cyber-attacks batter Web heavyweights, Feb 2000, http://www.cnn.com/2000/TECH/computing/02/09/cyber.attacks.01/index.html
  33. CNN .Immense. Network assault takes down Yahoo, February 2000, http://www.cnn.com/2000/TECH/computing/02/08/yahoo.assault.idg/index.html.
  34. Netscape. Leading web sites under attack, February 2000, http://technews.netscape.com/news/0-1007-200-1545348.html.
  35. CERT coordination center. Denial of Service attacks, http://www.cert.org/tech_tips/denial_of_service.htm
  36. National Infrastructure Security Coordination Centre, " Botnets - the threat to the critical national infrastructure. Briefing 11a/2005," October 2005.
  37. Global Risk Network. World economic forum global risk report 2006, http://www.weforum.org/en/initiatives/globalrisk/.
  38. Gilgor V, " A Note on the Denial-of-Service Problem," Proc. Symp. Security and Privacy , 1983, pp. 139-149.
  39. Georgios Loukas and Gulay Oke, "Protection Against Denial of Service Attacks.," Intelligent Systems and Networks Group, Imperial College, 2009.
  40. Morris R.T, " A Weakness in the 4.2BSD UNIX TCP/IP Software," Computer Science Technical Report, 1985.
  41. Paul J. Criscuolo," Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, and Stacheldraht CIAC-2319,"February 14 2000.
  42. "Yahoo on Trial of Site Hackers", http://www.wired.com/news/business/0,1367,34221,00.html
  43. Stephen M.Specht and Ruby B.Lee, "Distributed Denial of Service: Taxanomies of Attacks, Tools and Countermeasures," September 2004.
  44. Nmap Stealth Port Scanner Introduction, http://://www.insecure.org/nmap/.
  45. SANS,2006 Survival Time History, http://isc.dshield.org/survivalhistory.php
  46. Vern Paxson, Stuart Staniford, and Nicholas Weaver, " How to own the Internet in Your Spare Time,"11th USENIX Security Symposium,2002.
  47. Security Privacy-Silver Linings in the Cloud, http://books.google.com.my/books
  48. "Managing Denial of Service (DOS) Attacks,"Summary Report for CIOs and CSOs, December 2009.
  49. D.Dittrich, "The Trible Flood Network Distributed Denial Service Attack Tool," October 21.
  50. J.Barlow, W.Thrower, TFN2K an Analysis,
  51. D.Dittrich, "The_Stacheldraht_Distributed Denial of attack tool,"1999.
  52. D.Dittrich, G.Weaver, S.Dietrich and N.Long, "The mstream Distributed Denial of Service Attack Tool" May 2000.
  53. S.Dietrich, N.Long, D.Dittrich, "Analyzing Distributed Denial Services Tools:theShaftCase,"14th Systems Administration Conference.
  54. B.Hancock, "A DDOS Tool, Hits the Streets," Computer Security, 2000.
  55. Continuing Threats to home users, http://www.cert.org/advisories/CA-2001-20.html.
  56. Trusted Information Sharing Network: About Critical Infrastructure, http://www.tisn.gov.au.