Performing and Mitigating a Distributed Denial of Service Attack

Creative Commons License

Şanli Y., Mohmand H., Win L. L., Tonyali S.

International Symposium of Scientific Research and Innovative Studies (ISSRIS), Balıkesir, Turkey, 22 February 2021, pp.1267-1279

  • Publication Type: Conference Paper / Full Text
  • City: Balıkesir
  • Country: Turkey
  • Page Numbers: pp.1267-1279
  • Abdullah Gül University Affiliated: Yes


The Internet has become an indispensable part of our lives. It is widely adopted and in use by people regardless of their age, gender, religion, nationality, and social economic class. Today, we can purchase goods, socialize, and meet people on websites that we can access through the Internet. Thus, it has become a new means to earn income. This has attracted malicious individuals’ and organizations’ attention. Cybercriminals who want to screw money out of these websites’ owners or competitors who want to infamize their opponents attempt to disrupt access to these websites by performing Denial of Service or Distributed Denial of Service attacks. Denial of Service attacks are performed by sending either malformed packets that exploit a vulnerability existing in target system’s software such as firmware, protocol stack, or services and paralyze it such that it cannot respond legitimate requests or sending requests to web servers many more than they can handle resulting in a denial of service. Since it is easy to detect the source of such attacks with today’s technology, modern attackers launch Distributed Denial of Service attacks in which a large number of connected devices create plenty of requests to flood the servers, which make it difficult for the servers to distinguish legitimate and malicious requests. Therefore, network communication must be secured against these cyber attacks. There are various defense mechanisms to prevent these attacks, for example, detection mechanisms, response mechanisms and tolerance mechanisms. In this work, we develop a website using ASP.NET Core and simulate a command and control mechanism to attack that website. Then, we implement a defense mechanism to prevent this attack.