Research on counter bandwidth depletion DDoS attacks based on Genetic algorithm

被引:0
|
作者
Guo, Rui [1 ]
Chang, Guiran [1 ]
Hou, Ruidong [1 ]
Qin, Yuhai [3 ]
Sun, Baojing [2 ]
liu, An [2 ]
Jia, Yan [2 ]
Peng, Dan [3 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
[2] Coll Shenyang Artilliery, Elect Scout & Command Dept, Shenyang, Peoples R China
[3] China Criminal Police Univ, Shenyang, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we advocate that routers will filter bandwidth depletion of DDoS traffic. It is our consideration that server owners who experience an attack should work with ISP routers to defend DDoS. The main idea. is to use statistical approaches of Netflow to allocate weighted bandwidth at the routers. We propose a new algorithm based on Genetic Algorithm to filter traffic on routers and maximize goodput. The feasibility and effectiveness of our approach is validated by measuring the performance of an experimental prototype against a series of attacks. The advantages of the scheme are discussed and further research directions are given.
引用
收藏
页码:155 / +
页数:2
相关论文
共 50 条
  • [21] Hybrid Algorithm to Detect DDoS Attacks in VANETs
    Kaushik Adhikary
    Shashi Bhushan
    Sunil Kumar
    Kamlesh Dutta
    Wireless Personal Communications, 2020, 114 : 3613 - 3634
  • [22] Request diversion: a novel mechanism to counter P2P-based DDoS attacks
    Al-Duwairi, Basheer
    Mustafa, Abdul-Raheem Masoud
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2010, 5 (1-2) : 55 - 64
  • [23] A Novel Hybrid Method Using Grey Wolf Algorithm and Genetic Algorithm for IoT Botnet DDoS Attacks Detection
    Maazalahi, Mahdieh
    Hosseini, Soodeh
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2025, 18 (01)
  • [24] Research on An Effective Approach against DDoS Attacks
    Zeng Xiao-hui
    Peng Xuan-ge
    Li Man-hua
    Xu Hong-qi
    Jin Shi-yao
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 21 - +
  • [25] Step-tracking Algorithm of DDoS Attacks Based on Advanced Marking Scheme
    Yang Xueqin
    Yang Xuehui
    Chen Chaobo
    PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INFORMATION TECHNOLOGY (ICMIT), 2016, 49 : 43 - 48
  • [26] An Overview of DDoS attacks based on DNS
    Alieyan, Kamal
    Kadhum, Mohammed M.
    Anbar, Mohammed
    Ul Rehman, Shafiq
    Alajmi, Naser K. A.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 276 - 280
  • [27] Detecting DDoS Attacks using Decision Tree Algorithm
    Lakshminarasimman, S.
    Ruswin, S.
    Sundarakantham, K.
    2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2017,
  • [28] A Data Enhancement Algorithm for DDoS Attacks Using IoT
    Lv, Haibin
    Du, Yanhui
    Zhou, Xing
    Ni, Wenkai
    Ma, Xingbang
    SENSORS, 2023, 23 (17)
  • [29] Bandwidth Control Mechanism and Extreme Gradient Boosting Algorithm for Protecting Software-Defined Networks Against DDoS Attacks
    Alamri, Hassan A.
    Thayananthan, Vijey
    IEEE ACCESS, 2020, 8 : 194269 - 194288
  • [30] The Research of DDoS Attack Detecting Algorithm Based on the Feature of the Traffic
    Feng, Jiang
    Liu, Yuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4619 - +