Published January 1, 2022
| Version v1
Journal article
Open
Distributed Denial of Service (DDoS): A History
- 1. Clemson Univ, Holcombe Dept Elect & Comp Engn, Clemson, SC 29634 USA
- 2. Recep Tayyip Erdogan Univ, Dept Comp Engn, TR-53100 Merkez Rize, Turkey
- 3. Clemson Univ, Clemson, SC 29634 USA
- 4. Clemson Univ, Holcombe Dept Elect & Comp Engn, Comp Engn, Clemson, SC 29634 USA
Description
Distributed denial of service (DDoS) attacks remain a persistent nuisance on the Internet. They exploit the fact that the Internet lacks centralized access control. Since this vulnerability was a core design decision of the early Internet, DDoS attacks have persisted. This article presents the technologies and tools that are used in DDoS, followed by a timeline of the major DDoS incidents. This is followed by a discussion of the primary classes of DDoS incidents and how the computing ecosystem enables DDoS. Early attacks were related to hacker culture, but their focus quickly changed to commercial exploitation. There have also been a number of political uses of DDoS, including cyberwar, hacktivism, and terrorism.
Files
bib-7f03a4f5-01fe-4d14-95b2-9db1b691fce2.txt
Files
(168 Bytes)
| Name | Size | Download all |
|---|---|---|
|
md5:7db07d7ec4654d75a811185dcf790daf
|
168 Bytes | Preview Download |