INVESTIGATION MODEL FOR DDOS ATTACK DETECTION IN REAL-TIME

Abstract

Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack.

Authors and Affiliations

Abdulghani Ali Ahmed

Keywords

Related Articles

A MODIFIED ROUTE DISCOVERY APPROACH FOR DYNAMIC SOURCE ROUTING (DSR) PROTOCOL IN MOBILE AD-HOC NETWORKS

Mobile Ad-hoc networks (MANETs) involved in many applications, whether commercial or military because of their characteristics that do not depend on the infrastructure as well as the freedom movement of their elements, b...

SOFTWARE AGENT AND CLOUD COMPUTING: A BRIEF REVIEW

The merging of interests between Cloud applications which necessary require an intelligent software agent with elastic, dynamic, with independent behavior ability and multi-agent systems that need consistent distributed...

DATA SECURITY ISSUES IN CLOUD COMPUTING: REVIEW

Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for comput...

A SURVEY OF MEDICAL IMAGE PROCESSING TOOLS

A precise analysis of medical image is an important stage in the contouring phase throughout radiotherapy preparation. Medical images are mostly used as radiographic techniques in diagnosis, clinical studies and treatmen...

MODELLING THE UNIVERSITI MALAYSIA PAHANG EXAMINATION TIMETABLING PROBLEM

This paper presents a study of the Universiti Malaysia Pahang (UMP) examination timetabling problem and its constraints. UMP currently situated in two campuses (Gambang and Pekan) which presents many challenges in produc...

Download PDF file
  • EP ID EP254088
  • DOI -
  • Views 142
  • Downloads 0

How To Cite

Abdulghani Ali Ahmed (2015). INVESTIGATION MODEL FOR DDOS ATTACK DETECTION IN REAL-TIME. International Journal of Software Engineering and Computer Systems, 1(1), 93-104. https://europub.co.uk/articles/-A-254088