{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:30:03Z","timestamp":1750750203292},"reference-count":23,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4,1]]},"abstract":"<p>In the new era of computers, everyone relies on the internet for basic day-to-day activities to sophisticated and secret tasks. The cyber threats are increasing, not only theft and manipulation of someone's information, but also forcing the victim to deny other requests. A DDoS (Distributed Denial of Service) attack, which is one of the serious issues in today's cyber world needs to be detected and their advance towards the server should be blocked. In the article, the authors are focusing mainly on preventive measures of different types of DDoS attacks using multiple IPtables rules and Windows firewall advance security settings configuration, which would be feasibly free on any PC. The IPtables when appropriately selected and implemented can establish a relatively secure barrier for the system and the external environment.<\/p>","DOI":"10.4018\/ijisp.2020040101","type":"journal-article","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T15:57:54Z","timestamp":1579881474000},"page":"1-19","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Approach to Develop and Deploy Preventive Measures for Different Types of DDoS Attacks"],"prefix":"10.4018","volume":"14","author":[{"given":"Khundrakpam Johnson","family":"Singh","sequence":"first","affiliation":[{"name":"National Institute of Technology, Manipur, India"}]},{"given":"Janggunlun","family":"Haokip","sequence":"additional","affiliation":[{"name":"National Institute of Technology Manipur, India"}]},{"given":"Usham Sanjota","family":"Chanu","sequence":"additional","affiliation":[{"name":"NIELIT, Imphal, India"}]}],"member":"2432","reference":[{"key":"IJISP.2020040101-0","first-page":"1","article-title":"Mitigation of Distributed Denial of Service (DDoS) Threats.","author":"C. S.Abhilash","year":"2011","journal-title":"International Journal of Computers and Applications"},{"key":"IJISP.2020040101-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.01.012"},{"issue":"3","key":"IJISP.2020040101-2","first-page":"101","article-title":"Mitigating DoS\/DDoS attack using IPTables.","volume":"12","author":"Q.Bahaa","year":"2012","journal-title":"IACSIT International Journal of Engineering and Technology"},{"key":"IJISP.2020040101-3","doi-asserted-by":"crossref","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., & Kalita, J.K. (2015): An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recognition Letters, 51, 1-7.","DOI":"10.1016\/j.patrec.2014.07.019"},{"key":"IJISP.2020040101-4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"issue":"3","key":"IJISP.2020040101-5","first-page":"692","article-title":"Study of Different Attacks on Network & Transport Layer.","volume":"2","author":"R.Deepti","year":"2013","journal-title":"International Journal of Engineering and Computer Science"},{"key":"IJISP.2020040101-6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.18"},{"key":"IJISP.2020040101-7","doi-asserted-by":"publisher","DOI":"10.1201\/b17352-14"},{"issue":"11","key":"IJISP.2020040101-8","first-page":"450","article-title":"Mitigation of HTTP-GET flood Attack","volume":"2","author":"H.Khatri","year":"2014","journal-title":"International Journal for Research in Applied Science and Engineering Technology"},{"key":"IJISP.2020040101-9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"IJISP.2020040101-10","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2011.21005"},{"key":"IJISP.2020040101-11","doi-asserted-by":"crossref","unstructured":"Lyu, M., Sherratt, D., Sivanathan, A., Habibi Gharakheili, H., Radford, A., & Sivaraman, V. (2017). Quantifying the Reflective DDoS Attack Capability of Household IoT Devices. Proceedings of the ACM WiSec, Boston, MA. ACM.","DOI":"10.1145\/3098243.3098264"},{"key":"IJISP.2020040101-12","unstructured":"Munivara Prasad, K., Rama Mohan Reddy, A., & K.Venugopal Rao, K. (2014). DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms - A Survey. Global Journal of Computer Science and Technology: E Network, Web & Security, 14(7)."},{"key":"IJISP.2020040101-13","unstructured":"National Cybersecurity and Communications Integration Center. (2014). DDoS Quick Guide TLP: WHITE. Retrieved from https:\/\/www.us-cert.gov\/security-publications\/DDoS-Quick-Guide"},{"key":"IJISP.2020040101-14","unstructured":"Nikhil, T. (2013). DoS and DDoS Attacks: Impact, Analysis and Countermeasures. Proceedings of the NationalConference on Advance in Computing, Networking and Security, Nanded, India (pp. 93-98). Academic Press."},{"key":"IJISP.2020040101-15","unstructured":"Occupyweb. (2015). Denial-of-Service (DoS) Tools & Techniques. Hack Like A Pro. Retrieved from https:\/\/null-byte.wonderhowto.com\/how-to\/hack-like-pro-denial-service-dos-tools-techniques-0165699"},{"key":"IJISP.2020040101-16","doi-asserted-by":"crossref","unstructured":"Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y., & Sakurai, K. (2018). Lightweight Classification of IoT Malware Based on Image Recognition. Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo (pp. 664-669).","DOI":"10.1109\/COMPSAC.2018.10315"},{"key":"IJISP.2020040101-17","unstructured":"Subramani, R., & Sridhar, R. (2011). Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis. The SANS Institute. Retrieved from https:\/\/www.sans.org\/reading-room\/whitepapers\/detection \/paper \/33764"},{"key":"IJISP.2020040101-18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"IJISP.2020040101-19","article-title":"The Emperor\u2019s New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing.","author":"D.Wang","year":"2015","journal-title":"Proceedings of 20th European Symposium on Research in Computer Security"},{"key":"IJISP.2020040101-20","doi-asserted-by":"crossref","unstructured":"Wang, D., Zhang, Z., & Wang, P. (2016). Targeted Online Password Guessing: An Underestimated Threat. Proceedings of the CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria. ACM.","DOI":"10.1145\/2976749.2978339"},{"key":"IJISP.2020040101-21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700621"},{"key":"IJISP.2020040101-22","doi-asserted-by":"publisher","DOI":"10.1109\/32.55087"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=247424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:51:47Z","timestamp":1651881107000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2020040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2020040101","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}