Investigation Model for Ddos Attack Detection in Real-Time
Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. T...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UMP
2015
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf http://umpir.ump.edu.my/id/eprint/11843/ http:// dx.doi.o rg/10.15282/ijsecs.1.2015.8.0008 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Pahang Al-Sultan Abdullah |
Language: | English |
id |
my.ump.umpir.11843 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.118432018-05-16T08:00:14Z http://umpir.ump.edu.my/id/eprint/11843/ Investigation Model for Ddos Attack Detection in Real-Time Ahmed, Abdulghani Ali QA76 Computer software Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack. Penerbit UMP 2015 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf Ahmed, Abdulghani Ali (2015) Investigation Model for Ddos Attack Detection in Real-Time. International Journal of Software Engineering & Computer Sciences (IJSECS), 1. pp. 93-105. ISSN 2289-8522. (Published) http:// dx.doi.o rg/10.15282/ijsecs.1.2015.8.0008 DOI: 10.15282/ijsecs.1.2015.8.0008 |
institution |
Universiti Malaysia Pahang Al-Sultan Abdullah |
building |
UMPSA Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang Al-Sultan Abdullah |
content_source |
UMPSA Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Ahmed, Abdulghani Ali Investigation Model for Ddos Attack Detection in Real-Time |
description |
Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack. |
format |
Article |
author |
Ahmed, Abdulghani Ali |
author_facet |
Ahmed, Abdulghani Ali |
author_sort |
Ahmed, Abdulghani Ali |
title |
Investigation Model for Ddos Attack Detection in Real-Time |
title_short |
Investigation Model for Ddos Attack Detection in Real-Time |
title_full |
Investigation Model for Ddos Attack Detection in Real-Time |
title_fullStr |
Investigation Model for Ddos Attack Detection in Real-Time |
title_full_unstemmed |
Investigation Model for Ddos Attack Detection in Real-Time |
title_sort |
investigation model for ddos attack detection in real-time |
publisher |
Penerbit UMP |
publishDate |
2015 |
url |
http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf http://umpir.ump.edu.my/id/eprint/11843/ http:// dx.doi.o rg/10.15282/ijsecs.1.2015.8.0008 |
_version_ |
1822917314861858816 |