An Adaptive Approach for Defending against DDoS Attacks

被引:5
|
作者
Li, Muhai [1 ,2 ]
Li, Ming [1 ]
机构
[1] E China Normal Univ, Sch Informat Sci & Technol, Shanghai 200241, Peoples R China
[2] Zaozhuang Univ, Dept Comp Sci, Zaozhuang 277160, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1155/2010/570940
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In various network attacks, the Distributed Denial-of-Service (DDoS) attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Defending Against Evolving DDoS Attacks: A Case Study Using Link Flooding Incidents
    Kang, Min Suk
    Gligor, Virgil D.
    Sekar, Vyas
    [J]. SECURITY PROTOCOLS XXIV, 2017, 10368 : 47 - 57
  • [22] Defending Against Meek DDoS Attacks By IP Traceback-based Rate Limiting
    Jing, Yinan
    Wang, Xueping
    Xiao, Xiaochun
    Zhang, Gendu
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [23] A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment
    [J]. Iyengar, N. Ch. Sriman Narayana, 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (05):
  • [24] Mempool Optimization for Defending Against DDoS Attacks in PoW-based Blockchain Systems
    Saad, Muhammad
    Njilla, Laurent
    Kamhoua, Charles
    Kim, Joongheon
    Nyang, DaeHun
    Mohaisen, Aziz
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 285 - 292
  • [25] A new perspective in defending against DDoS
    Chen, SG
    Chow, R
    [J]. 10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 186 - 190
  • [26] Defending application DDoS with constraint random request attacks
    Yen, W
    Lee, MF
    [J]. 2005 ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), VOLS 1& 2, 2005, : 620 - 624
  • [27] IDR: An intrusion detection router for defending against Distributed Denial-of-Service (DDoS) attacks
    Chan, EYK
    Chan, HW
    Chan, KM
    Chan, VPS
    Chanson, ST
    Cheung, MMH
    Chong, CF
    Chow, KP
    Hui, AKT
    Hui, LCK
    Lam, LCK
    Lau, WC
    Pun, KKH
    Tsang, AYF
    Tsang, WW
    Tso, SCW
    Yeung, DY
    Yu, KY
    [J]. I-SPAN 2004: 7TH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND NETWORKS, PROCEEDINGS, 2004, : 581 - 586
  • [28] Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model
    Qi, Chunyang
    Huang, Jie
    Huang, Cheng
    Wu, Huaqing
    Shen, Xuemin
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6259 - 6264
  • [29] A Cost Optimized Solution for Defending Against DDoS Attacks: An Analysis of a Multi-layered Architecture
    Gaylah K.D.
    Vaghela R.S.
    Zongo W.-B.S.
    [J]. SN Computer Science, 4 (5)
  • [30] Using adaptive bandwidth allocation approach to defend DDoS attacks
    Lin, Chu-Hsing
    Liu, Jung-Chun
    Huang, Hsun-Chi
    Yang, Tsung-Che
    [J]. MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 176 - 181