Using adaptive bandwidth allocation approach to defend DDoS attacks

被引:5
|
作者
Lin, Chu-Hsing [1 ]
Liu, Jung-Chun [1 ]
Huang, Hsun-Chi [1 ]
Yang, Tsung-Che [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci & Informat Engn, Taichung 407, Taiwan
关键词
DoS attack; DDoS attack; network simulator; priority queue; bandwidth; IP spoofing;
D O I
10.1109/MUE.2008.23
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or resources of a targeted system. Although it is not possible to exempt entirely from denial of service or distributed denial of service attacks, we can limit the malicious user by controlling the traffic flow. In the paper, we propose to monitor the traffic pattern in order to alleviate distributed denial of service attacks. A bandwidth allocation policy will be adopted to assign normal users to a high priority queue and suspected attackers to a low priority queue. Simulations conducted in network simulator of our proposed priority queue-based scheme shows its effectiveness in blocking attack traffic while maintaining constant flows for legitimate traffic.
引用
收藏
页码:176 / 181
页数:6
相关论文
共 50 条
  • [1] Flow-cookies: Using bandwidth amplification to defend against DDoS flooding attacks
    Casado, Martin
    Cao, Pei
    Akella, Aditya
    Provos, Niels
    [J]. 2006 14TH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS, 2006, : 286 - +
  • [2] Multi layer approach to defend DDoS attacks caused by spam
    Nagamalai, Dhinaharan
    Dhinakaran, Cynthia
    Lee, Jae Kwang
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 97 - +
  • [3] An Adaptive Approach to Mitigate Ddos Attacks in Cloud
    Singh, Baldev
    Panda, S. N.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (10) : 47 - 52
  • [4] An Adaptive Approach for Defending against DDoS Attacks
    Li, Muhai
    Li, Ming
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [5] Enhancement of KaPoW Plugin to Defend Against DDoS Attacks
    Barakat, Farah Samir
    Kotb, Amira
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 319 - 330
  • [6] Using Exponentially Weighted Moving Average Algorithm to Defend Against DDoS Attacks
    Machaka, Pheeha
    Bagula, Antoine
    Nelwamondo, Fulufhelo
    [J]. 2016 PATTERN RECOGNITION ASSOCIATION OF SOUTH AFRICA AND ROBOTICS AND MECHATRONICS INTERNATIONAL CONFERENCE (PRASA-ROBMECH), 2016,
  • [7] Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT
    Luo, Xupeng
    Yan, Qiao
    Wang, Mingde
    Huang, Wenyao
    [J]. 2019 COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2019, : 392 - 395
  • [8] Facing DDoS bandwidth flooding attacks
    Furfaro, Angelo
    Pace, Pasquale
    Parise, Andrea
    [J]. SIMULATION MODELLING PRACTICE AND THEORY, 2020, 98
  • [9] Packet filtering to defend flooding-based DDoS attacks
    Hu, YH
    Choi, H
    Choi, HA
    [J]. 2004 IEEE/SARNOFF SYMPOSIUM ON ADVANCES IN WIRED AND WIRELESS COMMUNICATION, 2004, : 39 - 42
  • [10] A Security Analysis of a Hybrid Mechanism to Defend DDoS Attacks in SDN
    Jantila, Saksit
    Chaipah, Kornchawal
    [J]. 2016 INTERNATIONAL ELECTRICAL ENGINEERING CONGRESS, IEECON2016, 2016, : 437 - 440