Distributed reflection denial of service attack: A critical review

Riyadh Rahef Nuiaa, Selvakumar Manickam, Ali Hakem Alsaeedi
2021 International Journal of Power Electronics and Drive Systems (IJPEDS)  
As the world becomes increasingly connected and the number of users grows exponentially and "things" go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their
more » ... ck approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
doi:10.11591/ijece.v11i6.pp5327-5341 fatcat:xm4wt7jjvfff7olsckqf4q6clq