An exhaustive study of DDOS attacks and DDOS datasets Online publication date: Mon, 04-May-2020
by Joshua Ojo Nehinbe; Uchechukwu Solomon Onyeabor
International Journal of Internet Technology and Secured Transactions (IJITST), Vol. 10, No. 3, 2020
Abstract: Conceptually, frequent distributed denial of service (DDOS) attacks on corporate networks constitute serious challenges that demand urgent explanations. Consequently, several organisations have lost long-standing reputations, suffered huge financial losses and low patronages due to DDOS attacks. Now the strengths and weaknesses of the available DDOS traces are not recently discussed in contemporary literatures. Therefore, feelers have begun to question the resolute and validity of the existing models despite the fact that they were duly evaluated using some standard DDOS datasets. This paper discusses DDOS attacks rudiments and elaborately explicates some of the challenges associated with DDOS datasets. We use C++ programming language to empirically demonstrate potential datasets that researchers can adopt to investigate DDOS attacks. The results suggest that researchers can secure informative DDOS datasets by merging different DDOS datasets. The outcome would help investigators, analysts, data donors and litigators to determine and enforce of legal rights against intruders.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Technology and Secured Transactions (IJITST):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com