Abstract
Distributed Denial of Service attacks are one of the main problem of computer networks. There is no any method for protecting network user from source of the attack. Such attack could block network resources for many hours, while existing methods for protecting networks are using only firewalls and IDS/IPS mechanisms. Such solutions are not enough nowadays. This article presents the concept of Quality of Services methods and some well know network protocols for preparing network to fight with the DDoS attacks. This proposed concept lets the administrator to protect their network resources during the attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cert advisory ca-1996-21 tcp syn flooding and ip spoofing attacks, November 2000. http://www.cert.org/advisories/CA-1996-21.html
Cert advisory ca-1996-01 udp port denial-of-service attack, September 1997. http://www.cert.org/advisories/CA-1996-01.html
Apiecionek, Ł., Czerniak, J.M., Zarzycki, H.: Protection tool for distributed denial of services attack. In: Kozielski, S., Mrozek, D., Kasprowski, P., Małysiak-Mrozek, B., Kostrzewa, D. (eds.) BDAS 2014. CCIS, vol. 424, pp. 405–414. Springer, Heidelberg (2014). doi:10.1007/978-3-319-06932-6_39
Czerniak, J.M., Apiecionek, Ł., Zarzycki, H., Ewald, D.: Proposed CAEva simulation method for evacuation of people from a buildings on fire. In: Atanassov, K.T., et al. (eds.) Novel Developments in Uncertainty Representation and Processing. AISC, vol. 401, pp. 315–326. Springer, Heidelberg (2016). doi:10.1007/978-3-319-26211-6_27
Czerniak, J., Dobrosielski, W., Apiecionek, Ł., Ewald, D.: Representation of a trend in ofn during fuzzy observance of the water level from the crisis control center. In: Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, Annals of Computer Science and Information Systems, pp. 443–447. IEEE (2015)
Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A.: Fuzzy intrusion detection. In: IFSA World Congress and 20th NAFIPS International Conference, vol. 3, pp. 1506–1510. IEEE (2001)
Kozik, R., Choraś, M., Renk, R., Hołubowicz, W.: Semi-unsupervised machine learning for anomaly detection in HTTP traffic. In: Burduk, R., Jackowski, K., Kurzyński, M., Woźniak, M., Żołnierek, A. (eds.) CORES 2015. AISC, vol. 403, pp. 767–775. Springer, Heidelberg (2016). doi:10.1007/978-3-319-26227-7_72
Moor, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. ACM Trans. Comput. Syst. (TOCS) 24(2), 115–139 (2006)
Piechowiak, M., Zwierzykowski, P.: The evaluation of multicast routing algorithms with delay constraints in mesh networks. In: 8th IEEE, IET International Symposium on Communication Systems, Networks and Digital Signal Processing CSNSDP, Pozna’n, Poland (2012)
Piechowiak, M., Zwierzykowski, P.: The evaluation of unconstrained multicast routing algorithms in ad-hoc networks. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol. 291, pp. 344–351. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31217-5_36
Rocky, K., Chang, C.: Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun. Mag. 40, 42–51 (2002)
Schuba, C.L., Krsul, I., Huhn, M.G., Spafford, E.H., Sundaram, A.: Analysis of a denial of service attack on tcp. Computer Science Technical Reports. Paper 1327 (1996). http://docs.lib.purdue.edu/cstech/1327
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Apiecionek, L., Czerniak, J.M., Ewald, D. (2017). NEW QoS CONCEPT for Protecting Network Resources. In: Choraś, R. (eds) Image Processing and Communications Challenges 8. IP&C 2016. Advances in Intelligent Systems and Computing, vol 525. Springer, Cham. https://doi.org/10.1007/978-3-319-47274-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-47274-4_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47273-7
Online ISBN: 978-3-319-47274-4
eBook Packages: EngineeringEngineering (R0)