2018
DOI: 10.47839/ijc.17.1.945
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Agent Based Distributed Defense Mechanisms Against Ddos Attacks

Abstract: The current internet infrastructure is susceptible to distributed denial of service (DDoS) attacks and has no built in mechanism to defend against them. The research on these kinds of attacks and their defense is significant for the security and reliability of the internet. We have already proposed a collaborative agent based distributed DDoS defense scheme which detect and prevents against DDoS attacks in ISP (Internet Service Provider) boundaries. The actual task of defense is carried out by agents and coord… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 16 publications
0
1
0
1
Order By: Relevance
“…Consideration of collateral damage is a crucial part of evaluating the performance of a defence [25]. In CED3, the collateral damage of a defence consists of two parts: that caused by a defence when there is no attack, and that inflicted on servers that are not targeted, during an attack on a victim.…”
Section: Empirical Methodsmentioning
confidence: 99%
“…Consideration of collateral damage is a crucial part of evaluating the performance of a defence [25]. In CED3, the collateral damage of a defence consists of two parts: that caused by a defence when there is no attack, and that inflicted on servers that are not targeted, during an attack on a victim.…”
Section: Empirical Methodsmentioning
confidence: 99%
“…Smurf Attack: Es un ataque distribuido de denegación de servicio (DDoS, por sus siglas en inglés) en el que un atacante intenta inundar un servidor objetivo con paquetes del Protocolo de mensajes de control de Internet (ICMP, por sus siglas en inglés), al realizar solicitudes con la dirección IP falsificada del dispositivo objetivo a una o más redes informáticas, las redes informáticas luego responden al servidor objetivo, amplificando el tráfico de ataque inicial y potencialmente abrumando al objetivo, haciéndolo inaccesible (Aldaoud et al, 2021) UDP Flood: El host atacante lanza un ataque DoS emitiendo un comando de ataque con la dirección de la víctima, la duración del ataque, los métodos de ataque y otras instrucciones a los programas de control maestro, que sirven como controladores de ataques (Singh & Juneja, 2010). El objetivo es crear y enviar una gran cantidad de datagramas UDP, que se relaciona por medio del puerto 53 en UDP.…”
Section: Vulnerabilidadesunclassified