Research on counter bandwidth depletion DDoS attacks based on Genetic algorithm

被引:0
|
作者
Guo, Rui [1 ]
Chang, Guiran [1 ]
Hou, Ruidong [1 ]
Qin, Yuhai [3 ]
Sun, Baojing [2 ]
liu, An [2 ]
Jia, Yan [2 ]
Peng, Dan [3 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
[2] Coll Shenyang Artilliery, Elect Scout & Command Dept, Shenyang, Peoples R China
[3] China Criminal Police Univ, Shenyang, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we advocate that routers will filter bandwidth depletion of DDoS traffic. It is our consideration that server owners who experience an attack should work with ISP routers to defend DDoS. The main idea. is to use statistical approaches of Netflow to allocate weighted bandwidth at the routers. We propose a new algorithm based on Genetic Algorithm to filter traffic on routers and maximize goodput. The feasibility and effectiveness of our approach is validated by measuring the performance of an experimental prototype against a series of attacks. The advantages of the scheme are discussed and further research directions are given.
引用
收藏
页码:155 / +
页数:2
相关论文
共 50 条
  • [1] Research on active defense strategy of counter DDoS attacks based on Differential Games Model
    Guo, Rui
    Chang, Guiran
    Qin, Yuhai
    Sun, Baojing
    Feng, Yifu
    Peng, Dan
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 566 - +
  • [2] GA-based filtering algorithm to defend against DDoS attack due to bandwidth depletion
    School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
    不详
    Dongbei Daxue Xuebao, 2008, 3 (324-327):
  • [3] Facing DDoS bandwidth flooding attacks
    Furfaro, Angelo
    Pace, Pasquale
    Parise, Andrea
    SIMULATION MODELLING PRACTICE AND THEORY, 2020, 98
  • [4] A SOA approach to counter DDoS attacks
    Ye, Xinfeng
    Singh, Santokh
    2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 567 - +
  • [5] NBHU-based Method to Counter Quiet DDoS Attacks
    Zhang, Jing
    Liu, Hui
    Hu, Huaping
    Chen, Lin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 898 - 901
  • [6] Perimeter-based defense against high bandwidth DDoS attacks
    Chen, SG
    Song, QG
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2005, 16 (06) : 526 - 537
  • [7] A Hybrid Modified Grasshopper Optimization Algorithm and Genetic Algorithm to Detect and Prevent DDoS Attacks
    Mohammadi, S.
    Babagoli, M.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2021, 34 (04): : 811 - 824
  • [8] Simulation of dynamic honeypot based redirection to counter service level DDoS attacks
    Sardana, Anjali
    Joshi, Ramesh Chandra
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 259 - 262
  • [9] An Effective Approach to Counter Application Layer DDoS Attacks
    Devi, S. Renuka
    Yogesh, P.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [10] Viterbi Algorithm for Detecting DDoS Attacks
    Bongiovanni, Wilson
    Guelfi, Adilson E.
    Pontes, Elvis
    Silva, A. A. A.
    Zhou, Fen
    Kofuji, Sergio Takeo
    40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 209 - 212