Blackholing VS. Sinkholing: a Comparative Analysis
Anjali B Kaimal1, Aravind Unnikrishnan2, Leena Vishnu Namboothiri3

1Anjali B Kaimal, PG Student, Department of Computer Science and IT, Amrita vishwa vidhyapeetham school of arts and sciences, Kochi, Kerala, India.

2Aravind Unnikrishnan, PG Student, Department of Computer Science and IT, Amrita vishwa vidhyapeetham school of arts and sciences, Kochi, Kerala, India.

3Leena Vishnu Namboothiri, Assistant Professor, Department of Computer Science and IT, Amrita vishwa vidhyapeetham school of arts and sciences, Kochi, Kerala, India.

Manuscript received on 03 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript Published on 10 July 2019 | PP: 15-17 | Volume-8 Issue-7C2 May 2019 | Retrieval Number: G10040587C219/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Distributed denial of service attack has caused major security problems all over the world. Be it small systems, or large organizations, DDoS attack can have severe impact on their functioning. It is a method used by the attacker to suspend services to that system for a period of time so that legitimate users cannot access services. Many techniques have been developed to reduce the effect of DDoS attack on the system. In this paper, we study about two different methods used to detect and prevent DDoS attacks: Blackholing and Sinkholing. The purpose of this study is to identify when to use blackholing and when to use sinkholing

Keywords: Blackholing, Sinkholing, DOS, DDoS.
Scope of the Article: Computer Science and Its Applications