Abstract
In view of the current DDoS attack turning frequently, this paper mainly analysis characteristics of the DDoS attack based on botnet, and then provides a method of DDoS protection based on the push-back. This method is based on the classic push-back idea, ,and each router sends push-back request to its uplink routers when DDoS attack occurs; on receiving the push-back request, the router will match the feature of attack flow, and implement the flow control.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dagon, D.: Modeling botnet propagation using time zones. In: 13th Annual Network and Distributed System Secu-rity Symposium, San Diego. pp. 235–249 (2006)
Provos, N.: A virtual honeypot framework. In: Proceedings of 13th USENIX Security Symposium, San Diego, CA (2004)
Xue, L.: DDoS Attack Detection and Protection. University of Electronic Science and Technology (June 2003)
Li, J.: Comprehensive Analysis of DDoS Attack. Technology and Applications of Network Security, 7–9 (2007)
Youy, Z., Haque, A.: Dctecting flooding-based DDos attaeks. In: Proe. of the IEEE International Conference on Communications, pp. 1229–1234 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag GmbH Berlin Heidelberg
About this paper
Cite this paper
Jia, L. (2012). The Research on DDoS Attack Based on Botnet. In: Jin, D., Lin, S. (eds) Advances in Future Computer and Control Systems. Advances in Intelligent and Soft Computing, vol 159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29387-0_48
Download citation
DOI: https://doi.org/10.1007/978-3-642-29387-0_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29386-3
Online ISBN: 978-3-642-29387-0
eBook Packages: EngineeringEngineering (R0)