Hop-count filtering: an effective defense against spoofed DDoS traffic
Proceedings of the 10th ACM conference on Computer and communications security
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Towards user-centric metrics for denial-of-service measurement
Proceedings of the 2007 workshop on Experimental computer science
Design, deployment, and use of the DETER testbed
DETER Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
Simulation Study of Flood Attacking of DDOS
ICICSE '08 Proceedings of the 2008 International Conference on Internet Computing in Science and Engineering
Accurately Measuring Denial of Service in Simulation and Testbed Experiments
IEEE Transactions on Dependable and Secure Computing
Hi-index | 0.00 |
Basic model for DDoS detection and prevention needs to be developed primarily to analyse the relationship between attacker and defender. Research in DDoS attacks is mainly focused on qualitative modes than quantitative analysis. The proposed work incorporates Lanchester combat model to quantify the attacker strength thereby giving a clear picture of how a DDoS defence system should be secure and what level of effectiveness is required to mitigate the attack. The work model is divided into online monitoring system (OMS) where network anomalies are monitored using the various performance metrics and offline training system (OTS) differentiates spoofed traffic from normal traffic using hop count filtering (HCF) defence algorithm. The proposed work opens a new platform for researchers to know apriori what defence strategy should be employed for what kind of DDoS attack. The implementation is carried out on a distributed testbed build up on GNU/Linux machines.