Skip to main content

Quality of Services Method as a DDoS Protection Tool

  • Conference paper
Intelligent Systems'2014

Abstract

Presently, one of the main problems of computer networks are Distributed Denial of Service attacks which can block network resources like servers. In order to prevent such situations some mechanisms are needed. This paper gives an overview of the Quality of Services methods. A DDoS attack model is described for development purposes. In conslusion some new QoS features are presented. According to presented features QoS method could be used as a protection tool against DDoS attack which is also proven in this paper. The ability to implement the proposed QoS features has already been partially tested. Presented results suggest that the method could be applied widely in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kovac, D., Vince, T., Molnar, J., Kovacova, I.: Modern internet based production technology. In: Er, M.J. (ed.) New Trends in Technologies: Devices, Computer, Communication and Industrial Systems, pp. 145–164. SCIYO (2010)

    Google Scholar 

  2. Rocky, K.C.C.: Defending against flooding-based distributed denial-of-service attacks: A tutorial. IEEE Communications Magazine 40(10), 42–51 (2002)

    Article  Google Scholar 

  3. Moor, D., Shannon, C., Brown, D., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS) 24(2), 115–139 (2006)

    Article  Google Scholar 

  4. Schuba, C.L., Krsul, I.H.M.G., Spafford, E.H., S.A.: Analysis of a Denial of Service Attack on TCP. Computer Science Technical Reports, p. 1327. Purdue University Library (1996)

    Google Scholar 

  5. CERT: TCP SYN Flooding and IP Spoofing Attacks. Software Engineering Institute (2000), http://www.cert.org/advisories/CA-1996-21.html

  6. CERT: UDP Port Denial-of-Service Attack. Software Engineering Institute (1997), http://www.cert.org/advisories/CA-1996-01.html

  7. Wrzesien, M., Olejnik, L., R.R.: Ids/ips: Detection and prevention systems of hacking the computer networks. Studies and Materials in Applied Computer Science 4(7), 16–21 (2012) (in Polish)

    Google Scholar 

  8. Vokorokos, L., Ennert, M., H.M., J.,R.: A survey of parallel intrusion detection on graphical processors. In: Proceedings of International Scientific Conference INFORMATICS 2013, pp. 50–55. Department of Computers and Informatics, FEEI TU of Koơice (2013)

    Google Scholar 

  9. Mikoajewska, E., M.D.: E-learning in the education of people with disabilities. Advances in Clinical and Experimental Medicine 20(1), 103–109 (2011)

    Google Scholar 

  10. Apiecionek, L., C.J.M.: Qos solution for network resource protection. In: Proceedings of International Scientific Conference INFORMATICS 2013, pp. 73–76. Department of Computers and Informatics, FEEI TU of Koơice (2013)

    Google Scholar 

  11. Apiecionek, Ɓ., Czerniak, J.M., Zarzycki, H.: Protection tool for distributed denial of services attack. In: Kozielski, S., Mrozek, D., Kasprowski, P., MaƂysiak-Mrozek, B. z. (eds.) BDAS 2014. CCIS, vol. 424, pp. 405–414. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  12. Changwang, Z., Jianping, Y., Z.C., Ch., W.: Rred: Robust red algorithm to counter low-rate denial-of-service attacks. IEEE Communications Letters 14(5), 489–491 (2010)

    Google Scholar 

  13. Cheswick, W.R., B.S.M.: Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley Publishing Company (1994)

    Google Scholar 

  14. Chapman, B., Z.E.: Building Internet Firewalls. O’Reilly & Associates (1995)

    Google Scholar 

  15. w3schools team: Browser Statistics. Refsnes Data (2014), http://www.w3schools.com/browsers/browsers_stats.asp

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ɓukasz Apiecionek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Apiecionek, Ɓ., Czerniak, J.M., Dobrosielski, W.T. (2015). Quality of Services Method as a DDoS Protection Tool. In: Filev, D., et al. Intelligent Systems'2014. Advances in Intelligent Systems and Computing, vol 323. Springer, Cham. https://doi.org/10.1007/978-3-319-11310-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11310-4_20

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11309-8

  • Online ISBN: 978-3-319-11310-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics