Implementation of Slowloris Distributed Denial of Service (DDOS) Attack on Web Servers
Keywords:
DDOS Attack, Slowloris, Web SecurityAbstract
In recent times, denial of service (DoS) attacks poses a substantial threat to the existing resources on the Internet as well as internal and external network infrastructures. Denial of service attacks exploits vulnerabilities and depletes available resources of a given IT system. As a result, it directly degrades the performance of network services. There various types of DoS attacks. Some are engineered to use up resources from email and web services. These resource-consuming scheme subsequently makes the application services unavailable and inaccessible on the network. The majority of DoS attacks initiate multiple open or semi-open TCP connections on the target node. These open TCP connections disable the server from admitting legitimate requests as a result of multiple waiting connections on its sockets. This research seeks to implement a denial of service attack in python programming language in an attempt to further demystify the mechanism of such attacks and recommend mitigation techniques to address them.
References
Asri, S., & Pranggono, B. Impact of Distributed Denial-of-Service Attack on Advanced Metering Infrastructure. Wireless Personal Communications, 83(3), 2211–2223, 2015.
Bhosale, K. S., Nenova, M., & Iliev, G. The distributed denial of service attacks (DDoS) prevention mechanisms on application layer. 2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications, TELSIKS 2017 - Proceeding, 136–139, 2017.
Faria, V. da S., Gonçalves, J. A., da Silva, C. A. M., Vieira, G. de B., & Mascarenhas, D. M. Sdtow: A slowloris detecting tool for WMNS. Information (Switzerland), 11(12), 1–18, 2020.
Kant, K., & Tiwari, N. Denial of Service attack using Slowloris. 448–454, 2020.
Lukaseder, T., Ghosh, S., & Kargl, F. Mitigation of Flooding and Slow DDoS Attacks in a Software-Defined Network. ArXiv, 1–3, 2018.
Moustis, D., & Kotzanikolaou, P. Evaluating security controls against HTTP-based DDoS attacks. IISA 2013 - 4th International Conference on Information, Intelligence, Systems and Applications, 165–170, 2013.
Shorey, T., Subbaiah, D., Goyal, A., Sakxena, A., & Mishra, A. K. Performance Comparison and Analysis of Slowloris, GoldenEye and Xerxes DDoS Attack Tools. 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI, 318–322, 2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.