DDoS: Design, implementation and analysis of automated model

被引:0
作者
Tupakula, Udaya Kiran [1 ]
Varadharajan, Vijay [1 ]
Gajam, Ashok Kumar [1 ]
Vuppala, Sunil Kumar [2 ]
Rao, Pandalaneni Naga Srinivasa [3 ]
机构
[1] Information and Networked Systems Security Research, Division of ICS, Macquarie University
[2] Department of Electronics and Computer Engineering, Indian Institute of Technology Roorkee (IITR), Roorkee
[3] Hewlett Packard, Singapore 119960
关键词
Automated model; DdoS; Distributed denial of service; Intrusion detection; Network management;
D O I
10.1504/IJWMC.2007.013797
中图分类号
学科分类号
摘要
Earlier, we have proposed an automated model to minimise DDoS attacks in single ISP domain and extended the model to multiple ISP domains. Our approach has several advanced features to minimise DDoS attacks in the internet. The focus of this paper is twofold: firstly, to present a detailed description of the design and implementation of the proposed model and second to discuss and analyse the extensive set of results obtained from the implementation and simulations. We describe the prototype implementation of our automated model using NetProwler network intrusion detection system and HP OpenView Network Node Manager. We will also discuss the performance analysis of our model on a large scale using NS2 tool. Both prototype and simulation test results confirm that our approach offers a promising solution against DDoS problem in the internet and the model can be implemented in real time with minor modifications to the existing tools. Copyright © 2007 Inderscience Enterprises Ltd.
引用
收藏
页码:72 / 85
页数:13
相关论文
共 50 条
  • [41] The Network Management Data Model's Design and Implementation in Communication Field
    Chen, Yange
    AUTOMATIC MANUFACTURING SYSTEMS II, PTS 1 AND 2, 2012, 542-543 : 1298 - 1301
  • [42] Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks
    Lin, Hsiao-Chung
    Wang, Ping
    Lin, Wen-Hui
    COMPUTERS, 2019, 8 (04)
  • [43] Improved Automated Graph and FCM Based DDoS Attack Detection Mechanism in Software Defined Networks
    Li, Xin
    Fan, Zhijie
    Xiao, Ya
    Xu, Qian
    Zhu, Wenye
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2117 - 2127
  • [44] DDoS attack detection method using cluster analysis
    Lee, Keunsoo
    Kim, Juhyun
    Kwon, Ki Hoon
    Han, Younggoo
    Kim, Sehun
    EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (03) : 1659 - 1665
  • [45] Analysis and Detection of DDoS Attacks Targetting Virtualized Servers
    Ahmed, Nisar
    Sadhayo, Intesab Hussain
    Yousif, Zahid
    Naeem, Nadeem
    Parveen, Sajida
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (01): : 128 - 133
  • [46] Survey on Recent DDoS Mitigation Techniques and Comparative Analysis
    Rai, Ankur
    Challa, Rama Krishna
    2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 96 - 101
  • [47] Detecting DDoS Attacks at the Source Using Multiscaling Analysis
    Petiz, Ivo
    Salvador, Paulo
    Nogueira, Antonio
    Rocha, Eduardo
    2014 16TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM (NETWORKS), 2014,
  • [48] Application layer DDoS detection using clustering analysis
    Ye, Chengxu
    Zheng, Kesong
    She, Chuyu
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1038 - 1041
  • [49] DDoS detection and analysis system based on comprehensive scoring
    Li X.
    Liu J.
    Zhang Q.
    1600, Southeast University (47): : 20 - 24
  • [50] Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system
    An, Xingshuo
    Su, Jingtao
    Lue, Xing
    Lin, Fuhong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,