INVESTIGATION MODEL FOR DDOS ATTACK DETECTION IN REAL-TIME

Abstract

Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack.

Authors and Affiliations

Abdulghani Ali Ahmed

Keywords

Related Articles

PARAMETER-LESS SIMULATED KALMAN FILTER

Simulated Kalman Filter (SKF) algorithm is a new population-based metaheuristic optimization algorithm. In the original SKF algorithm, three parameter values are assigned during initialization, the initial error covarian...

CATEGORIZATION OF GELAM, ACACIA AND TUALANG HONEY ODORPROFILE USING K-NEAREST NEIGHBORS

Honey authenticity refer to honey types is of great importance issue and interest in agriculture. In current research, several documents of specific types of honey have their own usage in medical field. However, it is qu...

COMPARATIVE BENCHMARKING OF CONSTRAINTS T-WAY TEST GENERATION STRATEGY BASED ON LATE ACCEPTANCE HILL CLIMBING ALGORITHM

This paper describes the new t-way strategy based the Late Acceptance based Hill Climbing algorithm, called LAHC, for constraints t-way test generation. Unlike earlier competing work, LAHC does not require significant tu...

THE IMPACTS OF SOCIAL NETWORKING SITES IN HIGHER LEARNING

Social networking sites, a web-based application have permeated the boundary between personal lives and student lives. Nowadays, students in higher learning used social networking site such as Facebook to facilitate thei...

METAMODELLING APPROACH AND SOFTWARE TOOLS FOR PHYSICAL MODELLING AND SIMULATION

In computer science, metamodelling approach becomes more and more popular for the purpose of software systems development. In this paper, we discuss applicability of the metamodelling approach for development of software...

Download PDF file
  • EP ID EP254088
  • DOI -
  • Views 139
  • Downloads 0

How To Cite

Abdulghani Ali Ahmed (2015). INVESTIGATION MODEL FOR DDOS ATTACK DETECTION IN REAL-TIME. International Journal of Software Engineering and Computer Systems, 1(1), 93-104. https://europub.co.uk/articles/-A-254088