High-bandwidth traffic aggregates may occur during times of flooding-based distributed denial-of-service (DDoS) attacks which are also known as flash crowds problems. Congestion control of these traffic aggregates is important to avoid congestion collapse of network services. We perform fundamental researches to minimize the effect using existing congestion controls. We simulate DDoS attacks in different Internet topologies (Tiers model, Transit-Stub model, Scale-free model). We try to improve network resistance against DDoS attacks and similar overflow problems by using open-loop and close-loop congestion controls such as Droptail, RED and CHOKe. Furthermore we propose a new congestion contorl method based on protocol type of flow and comp...
Abstract — Increase in the usage of internet from mailing a friend to e-learning, e-commerce, e-medi...
Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which ...
Reliable distinguishing DDOS flood traffic from aggregated traffic is desperately desired by reliabl...
Defending the Internet against distributed denial of service (DDoS) attacks is a fundamental problem...
The current Internet infrastructure has very few built-in protection mechanisms and is therefore vul...
Abstract. DoS/DDoS attacks especially the Link Flooding have ex-erted severe threat on Internet. In ...
The current Internet infrastructure has very few built-in protection mechanisms, and is therefore vu...
Abstract—Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to...
Abstract—Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to...
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial ...
DDoS flooding attacks are one of the biggest concerns for security professionals and they are typica...
Currently, online organizational resources and assets are potential targets of several types of atta...
We propose a Controller-Agent model that would greatly minimize distributed denial-of-service (DDoS)...
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial ...
In this paper we focus on alleviating malicious traffic from DDoS attacks since many famous websites...
Abstract — Increase in the usage of internet from mailing a friend to e-learning, e-commerce, e-medi...
Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which ...
Reliable distinguishing DDOS flood traffic from aggregated traffic is desperately desired by reliabl...
Defending the Internet against distributed denial of service (DDoS) attacks is a fundamental problem...
The current Internet infrastructure has very few built-in protection mechanisms and is therefore vul...
Abstract. DoS/DDoS attacks especially the Link Flooding have ex-erted severe threat on Internet. In ...
The current Internet infrastructure has very few built-in protection mechanisms, and is therefore vu...
Abstract—Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to...
Abstract—Recent events show that distributed denial-of-service (DDoS) attack imposes great threat to...
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial ...
DDoS flooding attacks are one of the biggest concerns for security professionals and they are typica...
Currently, online organizational resources and assets are potential targets of several types of atta...
We propose a Controller-Agent model that would greatly minimize distributed denial-of-service (DDoS)...
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial ...
In this paper we focus on alleviating malicious traffic from DDoS attacks since many famous websites...
Abstract — Increase in the usage of internet from mailing a friend to e-learning, e-commerce, e-medi...
Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which ...
Reliable distinguishing DDOS flood traffic from aggregated traffic is desperately desired by reliabl...