Skip to main content

Protection Tool for Distributed Denial of Services Attack

  • Conference paper
Beyond Databases, Architectures, and Structures (BDAS 2014)

Abstract

This article presents a potential tool for solving one of the biggest problems of security of network resources in computer networks. This problem are the Distributed Denial of Service attacks, which are able to block the computer networks. The authors introduce the nature of the problem and subsequently present a tool which provides a possible solution to deal with it. The proposed methods have already been tested in the range of their impact on network resources. The results presented in this article suggest that the method may be implemented as an efficient solution for some DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Browser statistics and trends, http://www.w3schools.com/browsers/browsers_stats.asp

  2. Cert advisory ca-1996-01 udp port denial-of-service attack (September 1997), http://www.cert.org/advisories/CA-1996-01.html

  3. Cert advisory ca-1996-21 tcp syn flooding and ip spoofing attacks (November 2000), http://www.cert.org/advisories/CA-1996-21.html

  4. Apiecionek, L., Czerniak, J.: Qos solution for network resource protection. In: Proceedings of International Scientific Conference INFORMATICS 2013, Spiska Nova Ves, Slovakia, November 5-7 (2013)

    Google Scholar 

  5. Changwang, Z., Jianping, Y., Zhiping, C., Weifeng, C.: Rred: Robust red algorithm to counter low-rate denial-of-service attacks 14(5) (2010)

    Google Scholar 

  6. Chapman, B., Zwicky, E.: Building Internet Firewalls. O’Reilly ”&” Associates, Inc. (1995) ISBN 1-56592-124-0

    Google Scholar 

  7. Cheswick, W., Bellovin, S.: Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Publishing Company (1994) ISBN 0-201-63357

    Google Scholar 

  8. Kovác, D., Vince, T., Molnár, J., Kovácová, I.: Modern Internet Based Production Technology. In: New Trends in Technologies: Devices, Computer, Communication and Industrial Systems, pp. 145–164. SCIYO (2010)

    Google Scholar 

  9. Moore, D., Voelker, G., Savage, S.: Interferring Internet Denial-of-Service Activity (2006), NSN 7540-01-280-5500

    Google Scholar 

  10. Rocky, K., Chang, C.: Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Communications Magazine, 42–51 (October 2002)

    Google Scholar 

  11. Schuba, C., Krsul, I., Huhn, M., Spafford, E., Sundaram, A.: Analysis of a denial of service attack on tcp, computer science technical reports. Paper 1327 (1996), http://docs.lib.purdue.edu/cstech/1327

  12. Vokorokos, L., Ennert, M., Hartinger, M., Raduovska, J.: A survey of parallel intrusion detection on graphical processors. In: Proceedings of International Scientific Conference INFORMATICS, Spiska Nova Ves, Slovakia, November 5-7 (2013)

    Google Scholar 

  13. Wrzesień, M., Olejnik, Ł., Ryszawa, R.: Ds/ips: Detection and prevention systems of hacking the computer networks. Studies and Materials in Applied Computer Science 4(7), 16–21 (2012) (in Polish)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Łukasz Apiecionek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Apiecionek, Ł., Czerniak, J.M., Zarzycki, H. (2014). Protection Tool for Distributed Denial of Services Attack. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds) Beyond Databases, Architectures, and Structures. BDAS 2014. Communications in Computer and Information Science, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-319-06932-6_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06932-6_39

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06931-9

  • Online ISBN: 978-3-319-06932-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics