Filters








2,930 Hits in 3.4 sec

Simulation of Internet DDoS Attacks and Defense [chapter]

Igor Kotenko, Alexander Ulanov
2006 Lecture Notes in Computer Science  
The paper considers the software simulation tool DDoSSim which has been developed for comprehensive investigation of Internet DDoS attacks and defense mechanisms.  ...  This tool can be characterized by three main peculiarities: agent-oriented approach to simulation, packet-based imitation of network security processes, and open library of different DDoS attacks and defense  ...  DDoSSim intended for simulation of DDoS attacks and defense.  ... 
doi:10.1007/11836810_24 fatcat:7cdi3qbswzdhpbpuikwk3kd5yu

Coordinator-Agent Based Distributed Defense against DDoS Attacks in Transit-Stub Networks

Karanbir Singh, Kanwalvir Singh Dhindsa, Bharat Bhushan
2017 International Journal of Future Generation Communication and Networking  
A distributed denial of service (DDoS) attack can disrupt the normal functioning of Internet services of any organization.  ...  Here, we proposed a distributed defense mechanism which detects and mitigate DDoS attacks by monitoring traffic on the edge routers of stub networks.  ...  The target of the simulation is to find out whether the proposed agent-based distributed defense system can be able to detect and defend DDoS attack successfully.  ... 
doi:10.14257/ijfgcn.2017.10.10.05 fatcat:sescgxd3qrd4zox2x3q37dtvvm

Collaborative Agent-based Model for Distributed Defense against DDoS Attacks in ISP Networks

Karanbir Singh, Kanwalvir Singh Dhindsa, Bharat Bhushan
2017 International Journal of Security and Its Applications  
The proposed distributed defense model can defend DDoS attacks by placing defense agents and coordinator at different places over the Internet.  ...  The attacks like denial of service (DoS) and more specifically the distributed denial of service (DDoS) are one of the biggest threat to host and services of the Internet.  ...  The simulations of proposed model can be tested by using a discrete event simulator OMNeT++ [9] . The Internet-specific networks can be simulated in OMNeT++ by using INET framework [10] .  ... 
doi:10.14257/ijsia.2017.11.8.01 fatcat:55r2b5byk5eszmpv5duqd3j6ge

Controlling IP Falsifying Using Realistic Simulation

Govindavaram Madhusri, Chakunta Venkata Guru Rao
2013 International journal of network security and its applications  
The simulator will promote research in worm detection and defense, IP falsifying prevention and DDoS defense.  ...  The study of Internet-scale events such as worm proliferation, distributed denial-of-service attacks (DDoS), flash crowds, routing volatilities, and DNS attacks depend on the formation of all the networks  ...  We will further provide customization modules for simulation of popular worm defenses, distributed denial of service attacks and popular DDoS defenses, and IP falsifying and popular falsifying defenses  ... 
doi:10.5121/ijnsa.2013.5408 fatcat:sn757j5k6fh6jdwbnwkrvda3vu

An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach [article]

B. B. Gupta, Manoj Misra, R. C. Joshi
2012 arXiv   pre-print
Disruption from service caused by DDoS attacks is an immense threat to Internet today.  ...  Two statistical metrics namely, Volume and Flow are used as parameters to detect DDoS attacks.  ...  They proposed a novel concept of active defense against DDoS attacks to mitigate the infamous DDoS attacks in the Internet. Douligeris et al.  ... 
arXiv:1203.2400v1 fatcat:6buwyusftzghnhhvsyzebtjcwu

Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks [chapter]

Angelo Furfaro, Pasquale Pace, Andrea Parise, Lorena Molina Valdiviezo
2014 Lecture Notes in Computer Science  
Outline DDoS attacks Defense mechanisms StopIt DiffServ A ns-3 simulation model A novel defense technique exploiting StopIt and DiffServ Results Conclusions and future work A. Furfaro et al.  ...  A defense strategy against indirect DDoS flooding attacks  ...  Conclusions A ns-3 simulation model for the analysis of DDoS attack has been implemented A novel defense mechanism based on the cooperation of StopIt and DiffServ has been defined and evaluated The technique  ... 
doi:10.1007/978-3-319-11692-1_23 fatcat:bxrnqzdv6zasnlfkp76onmyjiq

SOM-based DDoS Defense Mechanism using SDN for the Internet of Things [article]

Yunfei Meng, Zhiqiu Huang, Senzhang Wang, Guohua Shen, Changbo Ke
2020 arXiv   pre-print
it can effectively enforce the security and robustness of the system when it is under DDoS attacks.  ...  To effectively tackle the security threats towards the Internet of things, we propose a SOM-based DDoS defense mechanism using software-defined networking (SDN) in this paper.  ...  This paper has been sponsored and supported by National Natural Science Foundation of China (Grant No.61772270), partially supported by National Natural Science Foundation of China (Grant No.61602262).  ... 
arXiv:2003.06834v2 fatcat:eypcrpv6trcuze4c4xmeulx26i

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

D. Ayyamuthukumar, S. Karthik
2015 Journal of Computer Science  
DDoS attacks have become very popular since the turn of this millennium and has stayed in the headlines due to ever increasing and sometimes devastating attacks on popular web servers.  ...  The results observed in simulation shows that the proposed approach detects the onset of the attacks very early and reacts to the threat by rate limiting the malicious flow based on the volume of attack  ...  Ethics This article is original and contains unpublished material. The corresponding author confirms that all of the other authors have read and approved the manuscript and no ethical issues involved.  ... 
doi:10.3844/jcssp.2015.438.442 fatcat:ngq3ichor5fmzmqxkaz2i24oki

EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK

S Meenakshi, S.K Srivatsa
2009 International Journal on Information Sciences and Computing  
Denial of service (DoS) attack is an attack on the availability of Internet services and resources.  ...  Flooding based distributed denial of service (DDOS) attack presents a very serious threat to the stability of the Internet.  ...  This paper presents the design details of a distributed defense mechanism against DDoS attack. The DDoS attack cannot be addressed through isolated actions of defense nodes. Fig. 3.  ... 
doi:10.18000/ijisac.50051 fatcat:dt6swcbv45a6fd32c53jbevcsa

Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services [article]

Zhuotao Liu and Yuan Cao and Min Zhu and Wei Ge
2019 arXiv   pre-print
Defending against distributed denial of service (DDoS) attacks in the Internet is a fundamental problem.  ...  Further, our physical testbed experiments and large scale simulations prove that Umbrella is effective to mitigate various DDoS attacks.  ...  INTRODUCTION Distributed denial of service (DDoS) attacks have been considered as a serious threat to the availability of Internet.  ... 
arXiv:1903.07796v3 fatcat:f4lg5nwgefdkfdywkt6mxvc75q

An Efficient Detection Mechanism for Distributed Denial of Service (DDoS) Attack [article]

Saravanan Kumarasamy, Dr.R.Asokan
2013 arXiv   pre-print
Simulations approved on the proposed mechanism have produced results that show efficiency of the proposed defense mechanism against DDoS attacks.  ...  The relative ease and low costs of initiation such attacks, supplemented by the present insufficient sate of any feasible defense method, have made them one of the top threats to the Internet centre of  ...  , due to the be short of a robust, foolproof, and universal DDoS attack defense mechanism.  ... 
arXiv:1302.5158v1 fatcat:vi7jjnj2w5ce7pinofoiuobad4

A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages

Yu Chen, Wei-Shinn Ku, Kazuya Sakai, Christopher DeCruze
2010 2010 7th IEEE Consumer Communications and Networking Conference  
Distributed Denial of Service (DDoS) attacks are one of the most damaging threats against Internet based applications.  ...  Many of the DDoS defense mechanisms may unintentionally deny a certain portion of legitimate user accesses by mistaking them as attackers or may simply not block enough traffic to adequately protect the  ...  Introduction Distributed Denial of Service (DDoS) attacks have become one of the major threats to Internet based services and electronic transactions [9] .  ... 
doi:10.1109/ccnc.2010.5421853 dblp:conf/ccnc/ChenKSD10 fatcat:46m5hlyhcbe3xou3owr5qgdhya

Catch Me If You Can: A Cloud-Enabled DDoS Defense

Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter Powell
2014 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks  
We introduce a cloud-enabled defense mechanism for Internet services against network and computational Distributed Denial-of-Service (DDoS) attacks.  ...  Our simulations and proof-ofconcept prototype using Amazon EC2 [1] demonstrate that we can successfully mitigate large-scale DDoS attacks in a small number of shuffles, each of which incurs a few seconds  ...  We propose a shuffling-based moving target defense to protect Internet services against both network and computational DDoS attacks.  ... 
doi:10.1109/dsn.2014.35 dblp:conf/dsn/JiaWFLSP14 fatcat:ttsubungsbcknjqjo35za52tfm

Collaborative Peer to Peer Defense Mechanism for DDoS Attacks

Usman Tariq, Yasir Malik, Bessam Abdulrazak, ManPyo Hong
2011 Procedia Computer Science  
Distributed Denial of Service (DDoS) attacks are the most common and easiest attacks to propagate over internet. It causes a high degree of destruction to the network and systems resources.  ...  The destructive nature of DDoS attacks force security engineers to design defense solutions which can detect and take counter actions to defend against such attacks.  ...  Evaluation: DDoS defense requires, large scale real time testing environment across the internet that can support thousands of nodes.  ... 
doi:10.1016/j.procs.2011.07.022 fatcat:rmogvha4abezzga3sgtndxk7vi

Trends in Validation of DDoS Research

Sunny Behal, Krishan Kumar
2016 Procedia Computer Science  
Most of the existing solutions have been validated using experiments based on simulation but recently, the researchers have started using publically available real datasets for the validation of DDoS research  ...  These attacks results in cripple down their services to legitimate users and cause huge financial losses.  ...  Introduction DDoS attacks have become a serious cause of problem and security threat for the enterprises, banks etc. doing businesses over the Internet.  ... 
doi:10.1016/j.procs.2016.05.170 fatcat:q7rj4ov4tbebletyzhcklcjuwe
« Previous Showing results 1 — 15 out of 2,930 results