20 Years of DDoS: a Call to Action

by   Eric Osterweil, et al.

Distributed Denial of Service (DDoS) attacks are now 20 years old; what has changed in that time? Their disruptive presence, their volume, distribution across the globe, and the relative ease of launching them have all been trending in favor of attackers. Our increases in network capacity and our architectural design principles are making our online world richer, but are favoring attackers at least as much as Internet services. The DDoS mitigation techniques have been evolving but they are losing ground to the increasing sophistication and diversification of the attacks that have moved from the network to the application level, and we are operationally falling behind attackers. It is time to ask fundamental questions: are there core design issues in our network architecture that fundamentally enable DDoS attacks? How can our network infrastructure be enhanced to address the principles that enable the DDoS problem? How can we incentivize the development and deployment of the necessary changes? In this article, we want to sound an alarm and issue a call to action to the research community. We propose that basic research and principled analyses are badly needed, because the status quo does not paint a pretty picture for the future.



There are no comments yet.


page 1

page 2

page 3

page 4


Mitigation of Flooding and Slow DDoS Attacks in a Software-Defined Network

Distributed denial of service (DDoS) attacks are a constant threat for s...

Expect More from the Networking: DDoS Mitigation by FITT in Named Data Networking

Distributed Denial of Service (DDoS) attacks have plagued the Internet f...

SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks

Slow-running attacks against network applications are often not easy to ...

A game-theoretic analysis of DoS attacks on driverless vehicles

Driverless vehicles are expected to form the foundation of future connec...

DNS attack mitigation Using OpenStack Isolation

The Domain Name System (DNS) is essential for the Internet, giving a mec...

Secure Access Control for DAG-based Distributed Ledgers

Access control is a fundamental component of the design of distributed l...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.