Skip to main content

Simulation and Analysis of Quiet DDOS Attacks

  • Conference paper
Instrumentation, Measurement, Circuits and Systems

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 127))

Abstract

The Quiet DDoS attack was proposed in 2009 by Amey and Nirwan. It launches certain number of TCP flows to reduce the transferring ability of normal TCP flows by using botnet. By the simulation experiments on the NS2 platform, we analyze the factors and their impacts on the attack in detail. According to the results of simulation, we give some suggestion to counter the Quiet DDoS attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kuzmanovic, A., Knightly, E.W.: Low-rate TCP-targeted denial-of-service attacks. In: Proceedings of ACM SIGCOMM 2003, Karlsruhe, Germany, pp. 75–86 (2003)

    Google Scholar 

  2. Guirguis, M., Bestavros, A., Matta, L.: Exploiting the transients of adaptation for RoQ attacks on Internet resources. In: ICNP 2004, Berlin, Germany, pp. 184–195 (2004)

    Google Scholar 

  3. Guirguis, M.: Reduction of Quality (RoQ) Attacks on Internet end-systems. In: Proceedings of the 24th IEEE INFOCOM, Miami, Florida (2005)

    Google Scholar 

  4. Luo, X., Chang, R.: On a new class of pulsing denial-of-service attacks and the defense. In: Proceedings of Network and Distributed System Security Symposium (NDSS 2005), San Diego, CA (2005)

    Google Scholar 

  5. Shevtekar, A., Ansari, N.: Is It Congestion or a DDoS Attack? IEEE Communications Letters 13(7), 546–548 (2009)

    Article  Google Scholar 

  6. Ebrahimi-Taghizadeh, S., Helmy, A., Gupta, S.: TCP vs. TCP: a Systematic Study of Adverse Impact of Short-lived TCP Flows on Long-lived TCP Flows. In: Proceedings of the 24th IEEE INFOCOM, Miami, Florida (2005)

    Google Scholar 

  7. McCanne, S., Floyd, S.: The network simulator-ns-2 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, J., Liu, B., Hu, H., Chen, L., Wang, T. (2012). Simulation and Analysis of Quiet DDOS Attacks. In: Zhang, T. (eds) Instrumentation, Measurement, Circuits and Systems. Advances in Intelligent and Soft Computing, vol 127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27334-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27334-6_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27333-9

  • Online ISBN: 978-3-642-27334-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics