Abstract

In Distributed Denial of Service (DDoS) attacks on a system for industrial monitoring are usually large numbers of packets. That flood thousands of infected hosts, waste network resources, and increase bandwidth. DDoS leads to a lack of productive leverage over the critical support of infrastructure. This paper includes a thorough review of several DDoS security techniques between 2016 and 2019 to execute such attacks. The question will answer in this review: 1)What kinds of cyber attacks are there? 2)The DDOS geography of cyberattacks? 3) What are the different approaches to cyber-attack mitigation? The DDoS Interest Traffic Mitigation Fine-Grained Interest Traffic Throttling (FITT) introduced because it offers excellent results and advantages over other methods. It provides good results and benefits. The process in which FITT uses the paper enables the network to identify DDoS. Directly from victim input, push the traffic of DDoS on its exact path through the system, as well as improve its power on malfunctioning organizations at its origin. FITT algorithm, which can respond actively to all forms of flooding of interest.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.