A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Simulation of Internet DDoS Attacks and Defense
[chapter]
2006
Lecture Notes in Computer Science
The paper considers the software simulation tool DDoSSim which has been developed for comprehensive investigation of Internet DDoS attacks and defense mechanisms. ...
This tool can be characterized by three main peculiarities: agent-oriented approach to simulation, packet-based imitation of network security processes, and open library of different DDoS attacks and defense ...
DDoSSim intended for simulation of DDoS attacks and defense. ...
doi:10.1007/11836810_24
fatcat:7cdi3qbswzdhpbpuikwk3kd5yu
Coordinator-Agent Based Distributed Defense against DDoS Attacks in Transit-Stub Networks
2017
International Journal of Future Generation Communication and Networking
A distributed denial of service (DDoS) attack can disrupt the normal functioning of Internet services of any organization. ...
Here, we proposed a distributed defense mechanism which detects and mitigate DDoS attacks by monitoring traffic on the edge routers of stub networks. ...
The target of the simulation is to find out whether the proposed agent-based distributed defense system can be able to detect and defend DDoS attack successfully. ...
doi:10.14257/ijfgcn.2017.10.10.05
fatcat:sescgxd3qrd4zox2x3q37dtvvm
Collaborative Agent-based Model for Distributed Defense against DDoS Attacks in ISP Networks
2017
International Journal of Security and Its Applications
The proposed distributed defense model can defend DDoS attacks by placing defense agents and coordinator at different places over the Internet. ...
The attacks like denial of service (DoS) and more specifically the distributed denial of service (DDoS) are one of the biggest threat to host and services of the Internet. ...
The simulations of proposed model can be tested by using a discrete event simulator OMNeT++ [9] . The Internet-specific networks can be simulated in OMNeT++ by using INET framework [10] . ...
doi:10.14257/ijsia.2017.11.8.01
fatcat:55r2b5byk5eszmpv5duqd3j6ge
Controlling IP Falsifying Using Realistic Simulation
2013
International journal of network security and its applications
The simulator will promote research in worm detection and defense, IP falsifying prevention and DDoS defense. ...
The study of Internet-scale events such as worm proliferation, distributed denial-of-service attacks (DDoS), flash crowds, routing volatilities, and DNS attacks depend on the formation of all the networks ...
We will further provide customization modules for simulation of popular worm defenses, distributed denial of service attacks and popular DDoS defenses, and IP falsifying and popular falsifying defenses ...
doi:10.5121/ijnsa.2013.5408
fatcat:sn757j5k6fh6jdwbnwkrvda3vu
An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
[article]
2012
arXiv
pre-print
Disruption from service caused by DDoS attacks is an immense threat to Internet today. ...
Two statistical metrics namely, Volume and Flow are used as parameters to detect DDoS attacks. ...
They proposed a novel concept of active defense against DDoS attacks to mitigate the infamous DDoS attacks in the Internet. Douligeris et al. ...
arXiv:1203.2400v1
fatcat:6buwyusftzghnhhvsyzebtjcwu
Modelling and Simulation of a Defense Strategy to Face Indirect DDoS Flooding Attacks
[chapter]
2014
Lecture Notes in Computer Science
Outline DDoS attacks Defense mechanisms StopIt DiffServ A ns-3 simulation model A novel defense technique exploiting StopIt and DiffServ Results Conclusions and future work A. Furfaro et al. ...
A defense strategy against indirect DDoS flooding attacks ...
Conclusions A ns-3 simulation model for the analysis of DDoS attack has been implemented A novel defense mechanism based on the cooperation of StopIt and DiffServ has been defined and evaluated The technique ...
doi:10.1007/978-3-319-11692-1_23
fatcat:bxrnqzdv6zasnlfkp76onmyjiq
SOM-based DDoS Defense Mechanism using SDN for the Internet of Things
[article]
2020
arXiv
pre-print
it can effectively enforce the security and robustness of the system when it is under DDoS attacks. ...
To effectively tackle the security threats towards the Internet of things, we propose a SOM-based DDoS defense mechanism using software-defined networking (SDN) in this paper. ...
This paper has been sponsored and supported by National Natural Science Foundation of China (Grant No.61772270), partially supported by National Natural Science Foundation of China (Grant No.61602262). ...
arXiv:2003.06834v2
fatcat:eypcrpv6trcuze4c4xmeulx26i
Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks
2015
Journal of Computer Science
DDoS attacks have become very popular since the turn of this millennium and has stayed in the headlines due to ever increasing and sometimes devastating attacks on popular web servers. ...
The results observed in simulation shows that the proposed approach detects the onset of the attacks very early and reacts to the threat by rate limiting the malicious flow based on the volume of attack ...
Ethics This article is original and contains unpublished material. The corresponding author confirms that all of the other authors have read and approved the manuscript and no ethical issues involved. ...
doi:10.3844/jcssp.2015.438.442
fatcat:ngq3ichor5fmzmqxkaz2i24oki
EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK
2009
International Journal on Information Sciences and Computing
Denial of service (DoS) attack is an attack on the availability of Internet services and resources. ...
Flooding based distributed denial of service (DDOS) attack presents a very serious threat to the stability of the Internet. ...
This paper presents the design details of a distributed defense mechanism against DDoS attack. The DDoS attack cannot be addressed through isolated actions of defense nodes.
Fig. 3. ...
doi:10.18000/ijisac.50051
fatcat:dt6swcbv45a6fd32c53jbevcsa
Umbrella: Enabling ISPs to Offer Readily Deployable and Privacy-Preserving DDoS Prevention Services
[article]
2019
arXiv
pre-print
Defending against distributed denial of service (DDoS) attacks in the Internet is a fundamental problem. ...
Further, our physical testbed experiments and large scale simulations prove that Umbrella is effective to mitigate various DDoS attacks. ...
INTRODUCTION Distributed denial of service (DDoS) attacks have been considered as a serious threat to the availability of Internet. ...
arXiv:1903.07796v3
fatcat:f4lg5nwgefdkfdywkt6mxvc75q
An Efficient Detection Mechanism for Distributed Denial of Service (DDoS) Attack
[article]
2013
arXiv
pre-print
Simulations approved on the proposed mechanism have produced results that show efficiency of the proposed defense mechanism against DDoS attacks. ...
The relative ease and low costs of initiation such attacks, supplemented by the present insufficient sate of any feasible defense method, have made them one of the top threats to the Internet centre of ...
, due to the be short of a robust, foolproof, and universal DDoS attack defense mechanism. ...
arXiv:1302.5158v1
fatcat:vi7jjnj2w5ce7pinofoiuobad4
A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages
2010
2010 7th IEEE Consumer Communications and Networking Conference
Distributed Denial of Service (DDoS) attacks are one of the most damaging threats against Internet based applications. ...
Many of the DDoS defense mechanisms may unintentionally deny a certain portion of legitimate user accesses by mistaking them as attackers or may simply not block enough traffic to adequately protect the ...
Introduction Distributed Denial of Service (DDoS) attacks have become one of the major threats to Internet based services and electronic transactions [9] . ...
doi:10.1109/ccnc.2010.5421853
dblp:conf/ccnc/ChenKSD10
fatcat:46m5hlyhcbe3xou3owr5qgdhya
Catch Me If You Can: A Cloud-Enabled DDoS Defense
2014
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
We introduce a cloud-enabled defense mechanism for Internet services against network and computational Distributed Denial-of-Service (DDoS) attacks. ...
Our simulations and proof-ofconcept prototype using Amazon EC2 [1] demonstrate that we can successfully mitigate large-scale DDoS attacks in a small number of shuffles, each of which incurs a few seconds ...
We propose a shuffling-based moving target defense to protect Internet services against both network and computational DDoS attacks. ...
doi:10.1109/dsn.2014.35
dblp:conf/dsn/JiaWFLSP14
fatcat:ttsubungsbcknjqjo35za52tfm
Collaborative Peer to Peer Defense Mechanism for DDoS Attacks
2011
Procedia Computer Science
Distributed Denial of Service (DDoS) attacks are the most common and easiest attacks to propagate over internet. It causes a high degree of destruction to the network and systems resources. ...
The destructive nature of DDoS attacks force security engineers to design defense solutions which can detect and take counter actions to defend against such attacks. ...
Evaluation: DDoS defense requires, large scale real time testing environment across the internet that can support thousands of nodes. ...
doi:10.1016/j.procs.2011.07.022
fatcat:rmogvha4abezzga3sgtndxk7vi
Trends in Validation of DDoS Research
2016
Procedia Computer Science
Most of the existing solutions have been validated using experiments based on simulation but recently, the researchers have started using publically available real datasets for the validation of DDoS research ...
These attacks results in cripple down their services to legitimate users and cause huge financial losses. ...
Introduction DDoS attacks have become a serious cause of problem and security threat for the enterprises, banks etc. doing businesses over the Internet. ...
doi:10.1016/j.procs.2016.05.170
fatcat:q7rj4ov4tbebletyzhcklcjuwe
« Previous
Showing results 1 — 15 out of 2,930 results