{"id":5504,"date":"2023-08-25T18:35:47","date_gmt":"2023-08-25T18:35:47","guid":{"rendered":"https:\/\/getmyprojects.in\/projects\/?post_type=product&#038;p=5504"},"modified":"2023-10-26T10:53:54","modified_gmt":"2023-10-26T05:23:54","slug":"bandwidth-distributed-denial-of-service-attacks-and-defenses","status":"publish","type":"product","link":"https:\/\/getmyprojects.in\/projects\/product\/bandwidth-distributed-denial-of-service-attacks-and-defenses\/","title":{"rendered":"Bandwidth Distributed Denial of Service: Attacks and Defenses"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #000000;\">The Internet is vulnerable to bandwidth distributed denial-of-service (BW-DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. So far, BW-DDoS attacks have employed relatively crude, inefficient, brute-force mechanisms; future attacks might be significantly more effective and harmful. To meet the increasing threats, more advanced defenses are necessary.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">BWDDOS attacks, where the attacker sends as many packets as possible directly to the victim, or from an attacker controlled machines called &#8216;zombies&#8217; or &#8216;bots&#8217;.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">The simplest scenario is one in which the attacker is sending multiple packets using a connection less protocol such as UDP.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">In UDP flood attacks, the attacker commonly has a user mode executable on the zombie machine which opens a standard UDP sockets and sends many UDP packets towards the victim.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">For UDP floods, and many other BWDDOS attacks, the attacking agents must have zombies, i.e., hosts running adversary controlled malware, allowing the malware to use the standard TCP\/IP sockets.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">The first attempts to avoid detection, and the second tries to exploit legitimate protocol behavior and cause legitimate clients\/server to excessively misuse their bandwidth against the attacked victim.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">Most BW-DDoS attacks use a few simple ideas, mainly flooding (many agents sending packets at the maximal rate) and reflection (sending requests to an uncompromised server with a spoofed sender IP address, causing the server to send longer response packets to the victim).<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">This BW-DDos attack defenses consider four types of defense mechanisms: filtering, rate limiting, detouring and absorbing, and breakthrough.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Advantages:<\/strong> <\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">Bandwidth based Identification<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">Easily Identifies attacker <\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">High attack detection<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<table>\n<tbody>\n<tr>\n<th><strong>Project Name<\/strong><\/th>\n<td>Bandwidth Distributed Denial of Service: Attacks and Defenses<\/td>\n<\/tr>\n<tr class=\"alt\">\n<th><strong>Front End\u00a0<\/strong><\/th>\n<td><\/td>\n<\/tr>\n<tr>\n<th><strong>Back End<\/strong><\/th>\n<td><\/td>\n<\/tr>\n<tr class=\"alt\">\n<th><strong>Software<\/strong><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":5882,"comment_status":"open","ping_status":"closed","template":"","meta":{"inline_featured_image":false},"product_cat":[29,28],"product_tag":[363,364,365,366,330,33,367,368,143],"_links":{"self":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5504"}],"collection":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/comments?post=5504"}],"version-history":[{"count":2,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5504\/revisions"}],"predecessor-version":[{"id":6385,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5504\/revisions\/6385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media\/5882"}],"wp:attachment":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media?parent=5504"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_cat?post=5504"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_tag?post=5504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}