Research on counter bandwidth depletion DDoS attacks based on Genetic algorithm

被引:0
|
作者
Guo, Rui [1 ]
Chang, Guiran [1 ]
Hou, Ruidong [1 ]
Qin, Yuhai [3 ]
Sun, Baojing [2 ]
liu, An [2 ]
Jia, Yan [2 ]
Peng, Dan [3 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
[2] Coll Shenyang Artilliery, Elect Scout & Command Dept, Shenyang, Peoples R China
[3] China Criminal Police Univ, Shenyang, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we advocate that routers will filter bandwidth depletion of DDoS traffic. It is our consideration that server owners who experience an attack should work with ISP routers to defend DDoS. The main idea. is to use statistical approaches of Netflow to allocate weighted bandwidth at the routers. We propose a new algorithm based on Genetic Algorithm to filter traffic on routers and maximize goodput. The feasibility and effectiveness of our approach is validated by measuring the performance of an experimental prototype against a series of attacks. The advantages of the scheme are discussed and further research directions are given.
引用
收藏
页码:155 / +
页数:2
相关论文
共 50 条
  • [31] ] Research on DDoS Filtering Algorithm based on Bloom Filter WhiteList
    Peng, Dan
    Chang, Guiran
    Guo, Rui
    Tang, Yanjun
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 291 - +
  • [32] Reconfigurable bandwidth controller for responding the DDoS attacks using token bucket mechanism
    Park, SK
    Oh, JT
    Kim, KY
    Jang, JS
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 377 - 380
  • [33] DDoS Attacks Detection and Traceback Method Based on Flow Entropy Algorithm and MPLS Principle
    Yang, Xiaohui
    Yu, Yue
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 670 - 683
  • [34] Research on intrusion tolerance parameters facing DDoS attacks
    Zhang, Zhaoxin
    Fang, Binxing
    Du, Yuejin
    Li, Bin
    Hu, Ping
    Gaojishu Tongxin/Chinese High Technology Letters, 2008, 18 (11): : 1123 - 1129
  • [35] Leveraging blockchain and machine learning to counter DDoS attacks over IoT network
    Kumari P.
    Jain A.K.
    Seth A.
    Raghav
    Multimedia Tools and Applications, 2025, 84 (1) : 317 - 341
  • [36] Multidimensional Attacks Classification Based on Genetic Algorithm and SVM
    Kaur, Ramandeep
    Bansal, Meenakshi
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 561 - 565
  • [37] Simulated Raindrop Algorithm to Mitigate DDoS Attacks in Cloud Computing
    Bhagat, Sourabh
    Pasupuleti, Syam Kumar
    6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 412 - 418
  • [38] A novel rate limit algorithm against meek DDoS attacks
    Jing, Yinan
    Wang, Xueping
    Xiao, Xiaochun
    Zhang, Gendu
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 467 - 476
  • [39] New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges
    Singh, Maninder Pal
    Bhandari, Abhinav
    COMPUTER COMMUNICATIONS, 2020, 154 (154) : 509 - 527
  • [40] Router-based DDoS attacks on their way
    不详
    COMPUTERS & SECURITY, 2001, 20 (08) : 645 - 645