A Study on DDOS Attacks, Types and its Prevention
Keywords:
Denial of Service (DoS), Distributed Denial of Service (DDoS), Flooding attacks, Internet of Things (IoT), Mitigation attacksAbstract
Digital availability on the Internet is harmed by Distributed Denial of Service (DDoS) attacks. DDoS attackers may severely harm users' expectations of receiving prompt and efficient services. A DDOS attack can come almost anywhere in the network and mostly sends an excessive number of packets to the affected server, which overwhelms it. Researchers from diverse fields have put out several corrective actions. This paper tries to discuss the recent solutions to DDoS attacks.
DDoS attacks disrupt network availability by flooding the target with a lot of unauthorized traffic, hogging its capacity, and overwhelming it to block the passage of legitimate traffic. We have also discussed the several DoS attack methods that are used against ISPs. Because the majority of users are inexperienced, DDoS assaults frequently target their devices, or they unintentionally join the Distributed Denial of Service attack Army. In this article, we classified DDoS assaults in detail and explored the causes, motivations, and effects of the attackers. Distributed Denial of Service attacks against Internet of Things (IoT) devices are developed based on network and application layers.