An Adaptive Approach for Defending against DDoS Attacks

被引:5
|
作者
Li, Muhai [1 ,2 ]
Li, Ming [1 ]
机构
[1] E China Normal Univ, Sch Informat Sci & Technol, Shanghai 200241, Peoples R China
[2] Zaozhuang Univ, Dept Comp Sci, Zaozhuang 277160, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2010/570940
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In various network attacks, the Distributed Denial-of-Service (DDoS) attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] An SDN-based Approach For Defending Against Reflective DDoS Attacks
    Lukaseder, Thomas
    StOlzle, Kevin
    Kleber, Stephan
    Erb, Benjamin
    Kargl, Frank
    [J]. PROCEEDINGS OF THE 2018 IEEE 43RD CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2018, : 299 - 302
  • [2] Practical Techniques for Defending against DDoS Attacks
    Chen, Eric Y.
    Yonezawa, Akinori
    [J]. 3RD ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, 2005, 2005,
  • [3] Defending against spoofed DDoS attacks with path fingerprint
    Lee, FY
    Shieh, S
    [J]. COMPUTERS & SECURITY, 2005, 24 (07) : 571 - 586
  • [4] Defending Wireless Infrastructure Against the Challenge of DDoS Attacks
    Xianjun Geng
    Yun Huang
    Andrew B. Whinston
    [J]. Mobile Networks and Applications, 2002, 7 : 213 - 223
  • [5] Two Layer Defending Mechanism against DDoS Attacks
    Subramanian, Kiruthika
    Gunasekaran, Preetha
    Selvaraj, Mercy
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (04) : 317 - 324
  • [6] Defending wireless infrastructure against the challenge of DDoS attacks
    Geng, XJ
    Huang, Y
    Whinston, AB
    [J]. MOBILE NETWORKS & APPLICATIONS, 2002, 7 (03): : 213 - 223
  • [7] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing (Network Research Center
    [J]. Journal of Electronics(China), 2006, (01) : 148 - 153
  • [8] AN APPROACH OF DEFENDING AGAINST DDOS ATTACK
    Wu Zhijun Duan Haixin Li Xing Network Research Center Tsinghua University Beijing China Tianjin Key Lab for Advanced Signal Processing Civil Aviation University of China Tianjin China
    [J]. JournalofElectronics., 2006, (01) - 153
  • [9] Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach
    Kim, Tae Hwan
    Kim, Dong Seong
    Jung, Hee Young
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (07) : 1511 - 1522
  • [10] An Adaptive Approach to Mitigate Ddos Attacks in Cloud
    Singh, Baldev
    Panda, S. N.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (10) : 47 - 52