Abstract
We study the effects of coupling of the Distributed Denial of Service (DDoS) attack with routing on a packet switching network (PSN) performance measured by throughput. We conduct our study using PSN model that it is an abstraction of the Network Layer of the 7-Layer ISO OSI Reference Model. Our study demonstrates that even a very “weak” DDoS attack on a network using static routing causes degradation of the network throughput. The values of the throughput almost immediately decrease with each onset of a DDoS attack and they decrease with the increase of the number of attackers. However, this is not the case when the network uses an adaptive routing instead. We consider two different types of adaptive routings and our study shows that the adaptive routings have ability to process efficiently extra packet traffic generated by DDoS attacks without compromising the network throughput when the total amount of the incoming packet traffic, i.e. the regular one and the one coming from an attack, is lower than the one corresponding to the critical source load value.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Traynor, I.: Russia accused of unleashing cyberwar to disable Estonia. The Guardian, May 17 (2007), http://www.guardian.co.uk/world/2007/may/17/topstories3.russia
The Economist: Cyberwarfare is becoming scarier, May 24 (2007), http://www.economist.com/world/international/displaystory.cfm?story_id=E1_JNNRSVS
http://www.theregister.co.uk/2002/10/23/feds_investigating_largest_ever_internet/
Lawniczak, A.T., Wu, H., Di Stefano, B.N.: DDoS attack detection using entropy of packet traffic in CA like data communication network model. In: Adamatzky, A., et al. (eds.) Automata-2008 Theory and Applications of Cellular Automata, pp. 573–584. Luniver Press, UK (2008)
Lawniczak, A.T., Wu, H., Di Stefano, B.N.: Detection & Study of DDoS Attacks Via Entropy in Data Network Models. In: Proc. of IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2009), p. 8 (2009)
Lawniczak, A.T., Wu, H., Di Stefano, B.N.: Detection of Packet Traffic Anomalous Behaviour via Information Entropy. In: Fortunato, S. (ed.) Complex Networks, CompleNet 2009. Studies in Computational Intelligence, vol. 207, pp. 197–208. Springer, Heidelberg (2009)
Leon-Garcia, A., Widjaja, I.: Communication Networks: Fundamental Concepts and Key Architectures. The McGraw-Hill Companies, Inc., New York (2000)
Lawniczak, A.T., Gerisch, A., Di Stefano, B.N.: Development and Performance of Cellular Automaton Model of OSI Network Layer of Packet Switching Networks. In: 16th IEEE CCECE 2003 – CCGEI 2003, vol. 2, pp. 1409–1412 (2003)
Lawniczak, A.T., Gerisch, A., Di Stefano, B.: OSI Network-layer Abstraction: Analysis of Simulation Dynamics and Performance Indicators. In: Mendes, J.F., et al. (eds.) Proc. of AIP Conference, New York, vol. 776, pp. 166–200 (2005)
Gerisch, A., Lawniczak, A.T., Di Stefano, B.: Building Blocks of a Simulation Environment of the OSI Network Layer of Packet Switching Networks. In: 16th IEEE CCECE 2003 – CCGEI 2003, p. 4 (2003)
Lawniczak, A.T., Gerisch, A., Maxie, K., Di Stefano, B.: Netzwerk: Migration of a Packet Switching Network Simulation Environment from MS Windows PC to Linux PC and to HPC. In: 19th International Symposium no High Performance Computing Systems and Applications, pp. 280–286. IEEE Press, Los Alamitos (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lawniczak, A.T., Wu, H., Di Stefano, B. (2010). Impact of Coupling of Distributed Denial of Service Attack with Routing on Throughput of Packet Switching Network . In: Bandini, S., Manzoni, S., Umeo, H., Vizzari, G. (eds) Cellular Automata. ACRI 2010. Lecture Notes in Computer Science, vol 6350. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15979-4_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-15979-4_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15978-7
Online ISBN: 978-3-642-15979-4
eBook Packages: Computer ScienceComputer Science (R0)