DDoS: Design, implementation and analysis of automated model

被引:0
作者
Tupakula, Udaya Kiran [1 ]
Varadharajan, Vijay [1 ]
Gajam, Ashok Kumar [1 ]
Vuppala, Sunil Kumar [2 ]
Rao, Pandalaneni Naga Srinivasa [3 ]
机构
[1] Information and Networked Systems Security Research, Division of ICS, Macquarie University
[2] Department of Electronics and Computer Engineering, Indian Institute of Technology Roorkee (IITR), Roorkee
[3] Hewlett Packard, Singapore 119960
关键词
Automated model; DdoS; Distributed denial of service; Intrusion detection; Network management;
D O I
10.1504/IJWMC.2007.013797
中图分类号
学科分类号
摘要
Earlier, we have proposed an automated model to minimise DDoS attacks in single ISP domain and extended the model to multiple ISP domains. Our approach has several advanced features to minimise DDoS attacks in the internet. The focus of this paper is twofold: firstly, to present a detailed description of the design and implementation of the proposed model and second to discuss and analyse the extensive set of results obtained from the implementation and simulations. We describe the prototype implementation of our automated model using NetProwler network intrusion detection system and HP OpenView Network Node Manager. We will also discuss the performance analysis of our model on a large scale using NS2 tool. Both prototype and simulation test results confirm that our approach offers a promising solution against DDoS problem in the internet and the model can be implemented in real time with minor modifications to the existing tools. Copyright © 2007 Inderscience Enterprises Ltd.
引用
收藏
页码:72 / 85
页数:13
相关论文
共 50 条
  • [21] A Hadoop based analysis and detection model for IP Spoofing typed DDoS attack
    Zhang, Jian
    Liu, Pin
    He, Jianbiao
    Zhang, Yawei
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1976 - 1983
  • [22] Artificial Neuron Network Implementation in Detection and Classification of DDoS Traffic
    Perakovic, Dragan
    Perisa, Marko
    Cvitic, Ivan
    Husnjak, Sinisa
    2016 24TH TELECOMMUNICATIONS FORUM (TELFOR), 2016, : 336 - 339
  • [23] Design and implementation of a closed loop time delay feedback control (CLTD-FC) system for mitigating DDos attacks
    Huang, Kaijiao
    Wang, Lifei
    Mehmood, Faisal
    Liu, Jianxun
    COMPUTERS & SECURITY, 2025, 151
  • [24] Abstract analysis of detection probability for statistically detecting DDoS attacks
    Li, M
    Chi, CH
    IC'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2003, : 607 - 608
  • [25] Design and Implementation of the Management Information Model for A Reconfigurable Network
    Yuan Bo
    Wang Bin-Qiang
    Zhang Xiao-jun
    Song Sha-sha
    2011 AASRI CONFERENCE ON APPLIED INFORMATION TECHNOLOGY (AASRI-AIT 2011), VOL 1, 2011, : 168 - 171
  • [26] Analysis of Simulation of DDOS Attack in Cloud
    Karthik, S.
    Shah, J. J.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [27] Simulation and Analysis of Quiet DDOS Attacks
    Zhang, Jing
    Liu, Bo
    Hu, Huaping
    Chen, Lin
    Wang, Tianzuo
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 71 - 81
  • [28] A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems
    Sogut, Esra
    Erdem, O. Ayhan
    APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [29] DDoS Tools: Classification, Analysis and Comparison
    Nagpal, Bharti
    Sharma, Pratima
    Chauhan, Naresh
    Panesar, Angel
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 342 - 346
  • [30] DDoS Intrusion Detection Model for IoT Networks using Backpropagation Neural Network
    Almotiri, Jasem
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (06) : 694 - 704