Security Techniques

System Resource Consumption DDoS Attacks and Mitigation Methods

System Resource Consumption DDoS Attacks and Mitigation Methods: The Transmission Control Protocol (TCP) provides connection-oriented, reliable and octet-stream-based communication service at the transport layer. The application layers of diverse hosts are always in need of reliable connections, but the IP layer fails to present such a stream mechanism. In reality, such requirements are almost always satisfied with the TCP protocol.

The TCP connection may be divided into three phrases: connection establishment, data transfer, connection termination. Owning to only focusing on the protocol availability in the designing process and lacking thorough consideration on its security, the TCP protocol exposes numerous security flaws and issues.

All the three phrases of the TCP connection are susceptible to DoS attacks, which are illustrated in detail as follows.

Standard