DDoS: Design, implementation and analysis of automated model

被引:0
作者
Tupakula, Udaya Kiran [1 ]
Varadharajan, Vijay [1 ]
Gajam, Ashok Kumar [1 ]
Vuppala, Sunil Kumar [2 ]
Rao, Pandalaneni Naga Srinivasa [3 ]
机构
[1] Information and Networked Systems Security Research, Division of ICS, Macquarie University
[2] Department of Electronics and Computer Engineering, Indian Institute of Technology Roorkee (IITR), Roorkee
[3] Hewlett Packard, Singapore 119960
关键词
Automated model; DdoS; Distributed denial of service; Intrusion detection; Network management;
D O I
10.1504/IJWMC.2007.013797
中图分类号
学科分类号
摘要
Earlier, we have proposed an automated model to minimise DDoS attacks in single ISP domain and extended the model to multiple ISP domains. Our approach has several advanced features to minimise DDoS attacks in the internet. The focus of this paper is twofold: firstly, to present a detailed description of the design and implementation of the proposed model and second to discuss and analyse the extensive set of results obtained from the implementation and simulations. We describe the prototype implementation of our automated model using NetProwler network intrusion detection system and HP OpenView Network Node Manager. We will also discuss the performance analysis of our model on a large scale using NS2 tool. Both prototype and simulation test results confirm that our approach offers a promising solution against DDoS problem in the internet and the model can be implemented in real time with minor modifications to the existing tools. Copyright © 2007 Inderscience Enterprises Ltd.
引用
收藏
页码:72 / 85
页数:13
相关论文
共 50 条
  • [1] The design and implementation of IP trace back method of DDoS attack using fastICA traffic analysis
    Xiang, Gao
    Xin, Zhang
    Xiao, Wang
    Journal of Convergence Information Technology, 2012, 7 (23) : 57 - 65
  • [2] Intrusion Detection System Model Implementation against DDOS attacks
    Nenova, Maria
    Atanasov, Denis
    Kassev, Kiril
    Nenov, Andon
    2019 IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, ANTENNAS, COMMUNICATIONS AND ELECTRONIC SYSTEMS (COMCAS), 2019,
  • [3] Design and analysis of DDoS mitigating network architecture
    Swati
    Roy, Sangita
    Singh, Jawar
    Mathew, Jimson
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 333 - 345
  • [4] Design and analysis of DDoS mitigating network architecture
    Sangita Swati
    Jawar Roy
    Jimson Singh
    International Journal of Information Security, 2023, 22 : 333 - 345
  • [5] Implementation of intrusion detection model for DDoS attacks in Lightweight IoT Networks
    Khanday, Shahbaz Ahmad
    Fatima, Hoor
    Rakesh, Nitin
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 215
  • [6] Design and Implementation of IoT DDoS Attacks Detection System based on Machine Learning
    Chen, Yi-Wen
    Sheu, Jang-Ping
    Kuo, Yung-Ching
    Nguyen Van Cuong
    2020 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC 2020), 2020, : 122 - 127
  • [7] Tracing DDoS floods: An automated approach
    Tupakula U.K.
    Varadharajan V.
    Journal of Network and Systems Management, 2004, 12 (1) : 111 - 135
  • [8] On Implementation of Efficient Inline DDoS Detector Based on AATAC Algorithm
    Wisniewski, Piotr
    Sosnowski, Maciej
    Burakowski, Wojciech
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2022, 68 (04) : 889 - 898
  • [9] Joint Entropy Analysis Model for DDoS Attack Detection
    Rahmani, Hamza
    Sahli, Nabil
    Kammoun, Farouk
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 267 - 271
  • [10] A TRAFFIC COHERENCE ANALYSIS MODEL FOR DDOS ATTACK DETECTION
    Rahmani, Hamza
    Sahli, Nabil
    Kammoun, Farouk
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 148 - 154