Abstract
This article presents a potential tool for solving one of the biggest problems of security of network resources in computer networks. This problem are the Distributed Denial of Service attacks, which are able to block the computer networks. The authors introduce the nature of the problem and subsequently present a tool which provides a possible solution to deal with it. The proposed methods have already been tested in the range of their impact on network resources. The results presented in this article suggest that the method may be implemented as an efficient solution for some DDoS attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Browser statistics and trends, http://www.w3schools.com/browsers/browsers_stats.asp
Cert advisory ca-1996-01 udp port denial-of-service attack (September 1997), http://www.cert.org/advisories/CA-1996-01.html
Cert advisory ca-1996-21 tcp syn flooding and ip spoofing attacks (November 2000), http://www.cert.org/advisories/CA-1996-21.html
Apiecionek, L., Czerniak, J.: Qos solution for network resource protection. In: Proceedings of International Scientific Conference INFORMATICS 2013, Spiska Nova Ves, Slovakia, November 5-7 (2013)
Changwang, Z., Jianping, Y., Zhiping, C., Weifeng, C.: Rred: Robust red algorithm to counter low-rate denial-of-service attacks 14(5) (2010)
Chapman, B., Zwicky, E.: Building Internet Firewalls. O’Reilly ”&” Associates, Inc. (1995) ISBN 1-56592-124-0
Cheswick, W., Bellovin, S.: Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Publishing Company (1994) ISBN 0-201-63357
Kovác, D., Vince, T., Molnár, J., Kovácová, I.: Modern Internet Based Production Technology. In: New Trends in Technologies: Devices, Computer, Communication and Industrial Systems, pp. 145–164. SCIYO (2010)
Moore, D., Voelker, G., Savage, S.: Interferring Internet Denial-of-Service Activity (2006), NSN 7540-01-280-5500
Rocky, K., Chang, C.: Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Communications Magazine, 42–51 (October 2002)
Schuba, C., Krsul, I., Huhn, M., Spafford, E., Sundaram, A.: Analysis of a denial of service attack on tcp, computer science technical reports. Paper 1327 (1996), http://docs.lib.purdue.edu/cstech/1327
Vokorokos, L., Ennert, M., Hartinger, M., Raduovska, J.: A survey of parallel intrusion detection on graphical processors. In: Proceedings of International Scientific Conference INFORMATICS, Spiska Nova Ves, Slovakia, November 5-7 (2013)
Wrzesień, M., Olejnik, Ł., Ryszawa, R.: Ds/ips: Detection and prevention systems of hacking the computer networks. Studies and Materials in Applied Computer Science 4(7), 16–21 (2012) (in Polish)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Apiecionek, Ł., Czerniak, J.M., Zarzycki, H. (2014). Protection Tool for Distributed Denial of Services Attack. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds) Beyond Databases, Architectures, and Structures. BDAS 2014. Communications in Computer and Information Science, vol 424. Springer, Cham. https://doi.org/10.1007/978-3-319-06932-6_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-06932-6_39
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06931-9
Online ISBN: 978-3-319-06932-6
eBook Packages: Computer ScienceComputer Science (R0)