Skip to main content

Impact of Coupling of Distributed Denial of Service Attack with Routing on Throughput of Packet Switching Network

  • Conference paper
  • 1696 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6350))

Abstract

We study the effects of coupling of the Distributed Denial of Service (DDoS) attack with routing on a packet switching network (PSN) performance measured by throughput. We conduct our study using PSN model that it is an abstraction of the Network Layer of the 7-Layer ISO OSI Reference Model. Our study demonstrates that even a very “weak” DDoS attack on a network using static routing causes degradation of the network throughput. The values of the throughput almost immediately decrease with each onset of a DDoS attack and they decrease with the increase of the number of attackers. However, this is not the case when the network uses an adaptive routing instead. We consider two different types of adaptive routings and our study shows that the adaptive routings have ability to process efficiently extra packet traffic generated by DDoS attacks without compromising the network throughput when the total amount of the incoming packet traffic, i.e. the regular one and the one coming from an attack, is lower than the one corresponding to the critical source load value.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://en.wikipedia.org/wiki/Denial-of-service_attack

  2. http://en.wikipedia.org/wiki/ICMP_Echo_Request

  3. Traynor, I.: Russia accused of unleashing cyberwar to disable Estonia. The Guardian, May 17 (2007), http://www.guardian.co.uk/world/2007/may/17/topstories3.russia

  4. The Economist: Cyberwarfare is becoming scarier, May 24 (2007), http://www.economist.com/world/international/displaystory.cfm?story_id=E1_JNNRSVS

  5. http://www.theregister.co.uk/2002/10/23/feds_investigating_largest_ever_internet/

  6. http://en.wikipedia.org/wiki/Mafiaboy#cite_note-13

  7. Lawniczak, A.T., Wu, H., Di Stefano, B.N.: DDoS attack detection using entropy of packet traffic in CA like data communication network model. In: Adamatzky, A., et al. (eds.) Automata-2008 Theory and Applications of Cellular Automata, pp. 573–584. Luniver Press, UK (2008)

    Google Scholar 

  8. Lawniczak, A.T., Wu, H., Di Stefano, B.N.: Detection & Study of DDoS Attacks Via Entropy in Data Network Models. In: Proc. of IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA 2009), p. 8 (2009)

    Google Scholar 

  9. Lawniczak, A.T., Wu, H., Di Stefano, B.N.: Detection of Packet Traffic Anomalous Behaviour via Information Entropy. In: Fortunato, S. (ed.) Complex Networks, CompleNet 2009. Studies in Computational Intelligence, vol. 207, pp. 197–208. Springer, Heidelberg (2009)

    Google Scholar 

  10. Leon-Garcia, A., Widjaja, I.: Communication Networks: Fundamental Concepts and Key Architectures. The McGraw-Hill Companies, Inc., New York (2000)

    Google Scholar 

  11. Lawniczak, A.T., Gerisch, A., Di Stefano, B.N.: Development and Performance of Cellular Automaton Model of OSI Network Layer of Packet Switching Networks. In: 16th IEEE CCECE 2003 – CCGEI 2003, vol. 2, pp. 1409–1412 (2003)

    Google Scholar 

  12. Lawniczak, A.T., Gerisch, A., Di Stefano, B.: OSI Network-layer Abstraction: Analysis of Simulation Dynamics and Performance Indicators. In: Mendes, J.F., et al. (eds.) Proc. of AIP Conference, New York, vol. 776, pp. 166–200 (2005)

    Google Scholar 

  13. Gerisch, A., Lawniczak, A.T., Di Stefano, B.: Building Blocks of a Simulation Environment of the OSI Network Layer of Packet Switching Networks. In: 16th IEEE CCECE 2003 – CCGEI 2003, p. 4 (2003)

    Google Scholar 

  14. Lawniczak, A.T., Gerisch, A., Maxie, K., Di Stefano, B.: Netzwerk: Migration of a Packet Switching Network Simulation Environment from MS Windows PC to Linux PC and to HPC. In: 19th International Symposium no High Performance Computing Systems and Applications, pp. 280–286. IEEE Press, Los Alamitos (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lawniczak, A.T., Wu, H., Di Stefano, B. (2010). Impact of Coupling of Distributed Denial of Service Attack with Routing on Throughput of Packet Switching Network . In: Bandini, S., Manzoni, S., Umeo, H., Vizzari, G. (eds) Cellular Automata. ACRI 2010. Lecture Notes in Computer Science, vol 6350. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15979-4_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15979-4_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15978-7

  • Online ISBN: 978-3-642-15979-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics