Performance Evaluation of BST Multicasting Network over ICMP Ping Flood for DDoS
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2011, Vol 2, Issue 12
Abstract
The Paper evaluates the performance of Bi-directional Shared Tree (BST) multicasting network with two sources and four receivers, attacked by five attackers. These attackers attack the source 1 in network by ICMP Ping Flood. Here we execute the simulation and draw network throughput between source 1 and source 2, queuing transmission delay and drop out data packets at source 1 for ping packet of size 16, 64 and 96 Bytes for 500, 1500 and 2500 ping packets per second. The simulation results indicate that throughput decreases with the increase in attack packet size and attack intensity, and remain constant for all values of intensity with larger packet size, delay increases with increase in attack packet size and decrease with increase in attacking intensity. Also, with the increase in attack packet size the number of dropped packets remain nearly same for different intensities.
Authors and Affiliations
Ashish Kumar , Ajay K Sharma , Arun Singh , Dr. B R Ambedkar
Computational Morphology and Natural Language Parsing for Indian Languages: A Literature Survey
Computational Morphology and Natural Language Parsing are the two important as well as essential tasks required for a number of natural language processing application including machine translation. Developing well fledg...
Implementation of Knowledge Mining with Ontology
Today, huge amount of data available on the web in the form of unstructured, semi-structured and unstructured data. With the use of ontology we can make structured data and use of knowledge mining. As, the knowledge mini...
SURVEY ON SIMULATION AND EMULATION TOOLS IN WIRELESS SENSOR NETWORK
Sensor networks are dense wireless networks of small, low-cost sensors which collect and propagate environmental data. Wireless sensor networks (WSNs) assist monitoring and controlling of physical environments from remot...
An Approach to Memory management in Wireless Sensor Networks
In recent years, wireless sensor network has become an important research domain. A typical WSN is a multi-hop wireless network consisting of hundreds or thousands of small sensor devices that are capable of sensing, pro...
Software Security: A Risk Taxonomy
The implementation of software has been challenging for many organizations. As given in the many reports of important failures, the implementation of packaged software and associated changes in business processes has pro...