ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

被引:0
|
作者
Grusnys, Saulius [1 ]
Lagzdinyte, Ingrida [1 ]
机构
[1] Kaunas Univ Technol, Dept Comp Networks, Kaunas, Lithuania
来源
INFORMATION TECHNOLOGIES' 2010 | 2010年
关键词
Distributed Denial of Service; DDoS; DDoS identification methods;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Defending against Distributed Denial of Service (DDoS) attacks is one of the most important tasks to ensure service availability. In this paper we present a software system, which implements some of the available methods to detect DDoS attacks and creates firewall rules to stop the traffic from the hosts suspected to be participating in the attack. Implemented methods include Change Point Approach, Covariance model and Passive Measurement based Heuristics. The system enables to analyze characteristics of implemented DDoS identification methods and evaluate their efficiency in different conditions.
引用
收藏
页码:183 / 188
页数:6
相关论文
共 50 条
  • [31] Kiram and WOE : Distributed Denial of Service Attacks in Named-Data Networking
    Hussain, Mohibi
    Crowcroft, Jon
    2018 IEEE 26TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2018, : 255 - 256
  • [32] Distributed Denial of service Attacks and its effects on Cloud Environment- a Survey
    Prabadevi, B.
    Jeyanthi, N.
    2014 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS, 2014,
  • [33] Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow
    Wang, Dongqi
    Chang, Guiran
    Feng, Xiaoshuo
    Guo, Rui
    NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 86 - 93
  • [34] Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud
    Alzahrani, Saba
    Hong, Liang
    2018 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2018), 2018, : 35 - 36
  • [35] Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers
    Luo, Hongbin
    Chen, Zhe
    Li, Jiawei
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1801 - 1815
  • [36] Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud
    Alosaimi, Wael
    Alshamrani, Mazin
    Al-Begain, Khalid
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 60 - 65
  • [37] Securing wireless mobile nodes from distributed denial-of-service attacks
    Varadharajan, Vijay
    Tupakula, Udaya
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (15) : 3794 - 3815
  • [38] Distributed Denial of Service (DDoS) Attacks Detection Using Machine Learning Prototype
    Hoyos Ll, Manuel S.
    Isaza E, Gustavo A.
    Velez, Jairo I.
    Castillo O, Luis
    DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, (DCAI 2016), 2016, 474 : 33 - 41
  • [39] Politically Motivated Denial of Service Attacks
    Nazario, Jose
    THE VIRTUAL BATTLEFIELD: PERSPECTIVES ON CYBER WARFARE, 2009, 3 : 163 - 181
  • [40] The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack
    Rikhotso, Vukosi
    Velempini, Mthulisi
    AD HOC NETWORKS AND TOOLS FOR IT, ADHOCNETS 2021, 2022, 428 : 63 - 71