INVESTIGATION MODEL FOR DDOS ATTACK DETECTION IN REAL-TIME
Journal Title: International Journal of Software Engineering and Computer Systems - Year 2015, Vol 1, Issue 1
Abstract
Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack.
Authors and Affiliations
Abdulghani Ali Ahmed
IMPROVED TWO-WAYS CLASSIFICATION FOR AGENT PATTERNS
Agent technology has been used in building various domain specific applications. The agent methodologies are proposed to aid the agent developer with the introduction of techniques, terminology, notation and guidelines d...
CATEGORIZATION OF GELAM, ACACIA AND TUALANG HONEY ODORPROFILE USING K-NEAREST NEIGHBORS
Honey authenticity refer to honey types is of great importance issue and interest in agriculture. In current research, several documents of specific types of honey have their own usage in medical field. However, it is qu...
A REVIEW OF SINGLE AND POPULATION-BASED METAHEURISTIC ALGORITHMS SOLVING MULTI DEPOT VEHICLE ROUTING PROBLEM
Multi-Depot Vehicle Routing Problem (MDVRP) arises with rapid development in the logistics and transportation field in recent years. This field, mainly, faces challenges in arranging their fleet efficiently to distribute...
COMPARATIVE BENCHMARKING OF CONSTRAINTS T-WAY TEST GENERATION STRATEGY BASED ON LATE ACCEPTANCE HILL CLIMBING ALGORITHM
This paper describes the new t-way strategy based the Late Acceptance based Hill Climbing algorithm, called LAHC, for constraints t-way test generation. Unlike earlier competing work, LAHC does not require significant tu...
MANAGING BUILDING CHECKIST PLANS USING BUSCLIS
This paper presents the software namely Building Submission Checklist System (BUSCLIS). It has been developed to manage the submission of building checklist plans process in the construction industry. BUSCLIS helps to si...