DDoS Attack Using GoldenEye, DAVOSET, and PyLoris Tools

Kadek Sudewo Mahadiv Wikrama, Rangga Firdaus, Linda Zal Medes Mendrofa, Gede Arna Jude Saskara, I Made Edy Listartha

Abstract


The development of computer networks is happening very rapidly, both in commercial installations, academics and homes of residents who now need and use internet access. Computer networks become a shared resource that is used by many applications representing different interests. With the ability and experience possessed by a hacker, he tries various kinds of computer network attacks with tools that are made independently or those that already exist are immediately used. A Distributed Denial of Service attack or what is often referred to as DDoS is a distributed attack with the aim of consuming the victim’s bandwidth or resource availability by flooding servers, network links, and network devices with unauthorized traffic. Some of the DDoS tools used to carry out attacks include GoldenEye, DAVOSET, PyLoris. 


Full Text:

PDF

References


Xie, Y., & Yu, S. Z. (2009). Monitoring the application-layer DDoS sttacks for popular websites. IEEE/ACM Transactions on Networking, 17(1), 15–25. https://doi.org/10.1109/TNET.2008.925628 (diakses 18 November 2022)

Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Buyya, R. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. In Computer Communications (Vol. 107, pp. 30–48). Elsevier B.V. https://doi.org/10.1016/j.comcom.2017.03.010 (diakses 18 November 2022)

Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. In Computer Communication Review (Vol. 34, Issue 2, pp. 39–53). https://doi.org/10.1145/997150.997156

(diakses 18 November 2022)

Sriram, B., & Santhosh Kumar, M. P. (2018). Distributed Denial of Service (DDOS) Attacks Detection Mechanism. In IJSTE-International Journal of Science Technology & Engineering | (Vol. 4, Issue 10). www.ijste.org (diakses 19 November 2022)

Gill, S. S., & Buyya, R. (2018). SECURE: Self-Protection Approach in Cloud Resource Management. IEEE Cloud Computing, 5(1), 60–72. https://doi.org/10.1109/MCC.2018.011791715 (diakses 19 November 2022)

Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks, 44(5), 643–666. https://doi.org/10.1016/j.comnet.2003.10.003 (diakses 19 November 2022)

Bawany, N. Z., Shamsi, J. A., & Salah, K. (2017). DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions. In Arabian Journal for Science and Engineering (Vol. 42, Issue 2, pp. 425–441). Springer Verlag. https://doi.org/10.1007/s13369-017-2414-5 (diakses 19 November 2022)

Jaafar, G. A., Abdullah, S. M., & Ismail, S. (2019). Review of Recent Detection Methods for HTTP DDoS Attack. In Journal of Computer Networks and Communications (Vol. 2019). Hindawi Limited. https://doi.org/10.1155/2019/1283472 (diakses 20 November 2022)

Behal, S., & Kumar, K. (2017). Characterization and comparison of DDoS attack tools and traffic generators - a review. International Journal of Network Security, 19(3), 383–393. https://doi.org/10.6633/IJNS.201703.19(3).07 (diakses 20 November 2022)

Jones, N. L., Sherman, P., Fallone, C. A., Flook, N., Ccfp, M. D., Smaill, F., Cb, M. B., Frcpc, F., Veldhuyzen Van Zanten, S., Rrcpc, M., Hunt, R., Frcp, M. B., Facg, F., & Thomson, A. (2005). Jones_H.qxd. In Can J Gastroenterol (Vol. 19, Issue 7). (diakses 21 November 2022)

Kaur, H., Behal, S., & Kumar, K. (2016). Characterization and comparison of Distributed Denial of Service attack tools. Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015, 1139–1145. https://doi.org/10.1109/ICGCIoT.2015.7380634 (diakses 21 November 2022)

Fadlil, A., Riadi, I., & Aji, S. (2017). Pengembangan sistem pengaman jaringan komputer berdasarkan analisis forensik jaringan. Jurnal Ilmu Teknik Elektro Komputer dan Informatika (JITEKI), 3(1), 11-19.https://www.researchgate.net/profile/Imam-Riadi-2/publication/318670501_Pengembangan_Sistem_Pengaman_Jaringan_Komputer_Berdasarkan_Analisis_Forensik_Jaringan/links/5976a94baca2728d02706ac8/Pengembangan-Sistem-Pengaman-Jaringan-Komputer-Berdasarkan-Analisis-Forensik-Jaringan.pdf. (diakses 22 November 2022)

Muttaqin, M., Halid, A., Resha, M., Andryanto, A., Firdian, F., Syamsu, S., ... & Sasongko, D. (2022).

Teknologi Jaringan Komputer. Yayasan Kita Menulis.

https://scholar.google.com/citations?user=ytBGmuEAAAAJ&hl=id&oi=sra. (diakses 22 November 2022)

Shorey, T., Subbaiah, D., Goyal, A., Sakxena, A., & Mishra, A. K. (2018, September). Performance comparison and analysis of slowloris, goldeneye and xerxes ddos attack tools. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 318-322). IEEE. https://ieeexplore.ieee.org/abstract/document/8554590/ (diakses 22 November 2022)

Sihombing, J. C. J., Kartikasari, D. P., & Bhawiyuga, A. (2019). Implementasi Sistem Deteksi dan Mitigasi Serangan Distributed Denial of Service (DDoS) menggunakan SVM Classifier pada Arsitektur Software-Defined Network (SDN). Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer e-ISSN, 2548, 964X. http://download.garuda.kemdikbud.go.id/article.php?article=1479208&val=10384&title=Implementasi%20Sistem%20Deteksi%20dan%20Mitigasi%20Serangan%20Distributed%20Denial%20of%20Service%20DDoS%20menggunakan%20SVM%20Classifier%20pada%20Arsitektur%20Software-Defined%20Network%20SDN. (diakses 22 November 2022)




DOI: http://dx.doi.org/10.24014/coreit.v9i2.20020

Refbacks

  • There are currently no refbacks.




Creative Commons License  site stats  
Jurnal CoreIT by http://ejournal.uin-suska.ac.id/index.php/coreit/ is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.