ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

被引:0
|
作者
Grusnys, Saulius [1 ]
Lagzdinyte, Ingrida [1 ]
机构
[1] Kaunas Univ Technol, Dept Comp Networks, Kaunas, Lithuania
来源
INFORMATION TECHNOLOGIES' 2010 | 2010年
关键词
Distributed Denial of Service; DDoS; DDoS identification methods;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Defending against Distributed Denial of Service (DDoS) attacks is one of the most important tasks to ensure service availability. In this paper we present a software system, which implements some of the available methods to detect DDoS attacks and creates firewall rules to stop the traffic from the hosts suspected to be participating in the attack. Implemented methods include Change Point Approach, Covariance model and Passive Measurement based Heuristics. The system enables to analyze characteristics of implemented DDoS identification methods and evaluate their efficiency in different conditions.
引用
收藏
页码:183 / 188
页数:6
相关论文
共 50 条
  • [21] Detecting Distributed Denial of Service Attacks Using Data Mining Techniques
    Alkasassbeh, Mouhammd
    Al-Naymat, Ghazi
    Hassanat, Ahmad B. A.
    Almseidin, Mohammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 436 - 445
  • [22] A review of amplification-based distributed denial of service attacks and their mitigation
    Ismail, Salih
    Hassen, Hani Ragab
    Just, Mike
    Zantout, Hind
    COMPUTERS & SECURITY, 2021, 109
  • [23] Comprehensive review on distributed denial of service attacks in wireless sensor networks
    Subramani, Shalini
    Selvi, M.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (3-4) : 414 - 438
  • [24] A Hybrid Defense Technique for ISP Against the Distributed Denial of Service Attacks
    Moon, Young Hoon
    Choi, Suk Bong
    Kim, Huy Kang
    Yoo, Changsok
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05): : 2347 - 2359
  • [25] Review on Mitigation of Distributed Denial of Service (DDoS) Attacks in Cloud Computing
    Khadke, Ashwini
    Madankar, Mangala
    Motghare, Manish
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [26] Denial of Service Attacks: An Overview
    Zlomislic, Vinko
    Fertalj, Kresimir
    Sruk, Vlado
    PROCEEDINGS OF THE 2014 9TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2014), 2014,
  • [27] Denial of service attacks, defences and research challenges
    Vinko Zlomislić
    Krešimir Fertalj
    Vlado Sruk
    Cluster Computing, 2017, 20 : 661 - 671
  • [28] A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed ) Denial of Service Attacks
    Malliga, S.
    Nandhini, P. S.
    Kogilavani, S. V.
    INFORMATION TECHNOLOGY AND CONTROL, 2022, 51 (01): : 180 - 215
  • [29] Analyzing well-known countermeasures against distributed denial of service attacks
    Beitollahi, Hakem
    Deconinck, Geert
    COMPUTER COMMUNICATIONS, 2012, 35 (11) : 1312 - 1332
  • [30] DISTRIBUTED DENIAL OF SERVICE (DDOS) NETWORK ATTACKS: IMPACT ON THE VIRTUAL LEARNING ENVIRONMENT
    Atayero, A. A.
    Oshin, O. I.
    Oshin, B. O.
    Alatishe, A. S.
    ICERI2014: 7TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2014, : 2235 - 2240